Getting Data In

How to index data from the directory based on the log created date in SPLUNK?

deepthi5
Path Finder

Hi Team,

I have a couple of logs to be monitored daily from a directory called LOG. The log name is error log.0, error log.1, and so on, where 0 means Sunday , 1 -->Monday etc. After 7 days, the logs will be automatically deleted from the directory.

Can someone suggest the search command to execute this? I have tried error log.* which will index all logs daily (unnecessary action)

Thanks
Deepthi

Tags (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

If you use "log.*" Splunk will indeed index all seven logs the first day, but after that should recognize that some files haven't changed and not re-index them.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...