I am facing an issue where SPLUNK does not index a file if the size is too low. The file sits in a UNC location(NAS), therefore, I created a data input to monitor the file. Splunk started indexing this file when the file size increased (I believe more than 800KB).
I believe Splunk has a limit to indicate the minimum file size to be indexed. Please help me finding the setting and overriding it.
There shouldn't be any minimum size for file to monitor. I have just configured file of size 126 bytes and it monitors. Splunk monitors the file and picks up the events if it has any content inside. The only possibility is that the file was indexed earlier and hence it didn't index again. Splunk checks first few bytes to determine if the file was already read