Getting Data In

How to undelete a input source

splukUP
Engager

I have a log file that was |delete'd from the index using search. I want the file back in the index. I did several steps of adding and removing the file as a Splunk input and restarting the machine's splunk. It just won't come back. Is there an easy way to |undelete?

Tags (1)
1 Solution

gkanapathy
Splunk Employee
Splunk Employee

There is no way to undelete the data. If you still have the original data, you can reindex the file with the Splunk oneshot command, examples http://answers.splunk.com/questions/684/after-fixing-props-conf-how-to-re-index-the-same-files-using... and sort-of docs: http://www.splunk.com/base/Documentation/4.1.4/Admin/CLIadmincommands

Splunk normally remembers files it has already seen and won't reindex them (even if you rename them) but oneshot bypasses this mechanism.

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee

There is no way to undelete the data. If you still have the original data, you can reindex the file with the Splunk oneshot command, examples http://answers.splunk.com/questions/684/after-fixing-props-conf-how-to-re-index-the-same-files-using... and sort-of docs: http://www.splunk.com/base/Documentation/4.1.4/Admin/CLIadmincommands

Splunk normally remembers files it has already seen and won't reindex them (even if you rename them) but oneshot bypasses this mechanism.

Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk + Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...