Getting Data In

When does start_from=newest catch up ?

itrimble1
Path Finder

We've been experiencing latency and are trying to figure out ways to solve it.

We forward events to a Windows Event Collector (Forwarder).

Our inputs.conf looks something like this.

[WinEventLog://ForwardedEvents]
sourcetype = WinEventLog:ForwardedEvents
disabled = 0
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 1
checkpointInterval = 5
index = wineventlog
renderXml = false
suppress_text = 0

We were then instructed to change the start_from = oldest to newest

After restarting the UF on the Windows Event collector, the newest events from that point in time were search able.

Then new events after that point in time *were not * .

Has anyone else experienced this behavior ?

When will Splunk catch up ?

0 Karma

adonio
Ultra Champion

read here in detail:
second * is the relevant one for your question, however the entire context is important too.

  start_from = <string>
    * How the input should chronologically read the Event Log channels.
    * If you set this setting to "oldest", the input reads Windows event logs
      from oldest to newest.
    * If you set this setting to "newest" the input reads Windows event logs
      in reverse, from newest to oldest. Once the input consumes the backlog of
      events, it stops.
    * If you set this setting to "newest", and at the same time set the
      "current_only" setting to 0, the combination can result in the input
      indexing duplicate events.
    * Do not set this setting to "newest" and at the same time set the
      "current_only" setting to 1. This results in the input not collecting
      any events because you instructed it to read existing events from oldest
      to newest and read only incoming events concurrently (A logically
      impossible combination.)
    * Default: "oldest".

link:
https://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf

0 Karma

itrimble1
Path Finder

Ok, so I read this correctly. After the newest invents are indexed, there will be no new events indexed, until you change it back to start_from = oldest again ?

Is my understanding correct ?

0 Karma

sergiollg
Loves-to-Learn Lots

I think so because I am facing the same issue.

0 Karma
Get Updates on the Splunk Community!

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...