Dashboards & Visualizations

Why Splunk doesn't index all the lines in a monitored file?

andrei_radu
New Member

Hello,

I use Splunk Universal Forwarder 6.3.4 on a centralized syslog collector and it's set to monitor a folder populated with symbolic links. (inputs.conf content below).

[monitor:///service/rsyslog/splunk/critical_systems/]
followSymlink = true
host_segment=5
sourcetype = critical_unix
index = critical_systems

Everything went good until i noticed that not all the lines inside the monitored files are being indexed. I'm not filtering anything with props.conf and transforms.conf. There's no pattern for the lines that are skipped, everything is random.

Any idea why this is happening and how to fix it?

Thanks!

0 Karma

andrei_radu
New Member

I found my problem. There were 2 different apps monitoring the same location, sending data to different indexes. So logs went randomly into only one index. Disabled one of the apps and now everything looks fine.

0 Karma

ddrillic
Ultra Champion

When we index, we make an assumption that the Splunk time stamp process works well.

We see here an example where this process didn't work as expected - Can't index new data..? :S

It says -

alt text

0 Karma

lguinn2
Legend

Do you see any messages in $SPLUNK_HOME/var/log/splunk/splunkd.log? In particular, I would look at this log file on the forwarder

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...