- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Why am I unable to index a file if the size is too small? Is there a minimum file size setting?
Hi Friends,
I am facing an issue where SPLUNK does not index a file if the size is too low. The file sits in a UNC location(NAS), therefore, I created a data input to monitor the file. Splunk started indexing this file when the file size increased (I believe more than 800KB).
I believe Splunk has a limit to indicate the minimum file size to be indexed. Please help me finding the setting and overriding it.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Hi Gaurav,
There shouldn't be any minimum size for file to monitor. I have just configured file of size 126 bytes and it monitors. Splunk monitors the file and picks up the events if it has any content inside. The only possibility is that the file was indexed earlier and hence it didn't index again. Splunk checks first few bytes to determine if the file was already read
What goes around comes around. If it helps, hit it with Karma 🙂
