Getting Data In

Why doesn't Splunk index old events in same log file?

SS1
Path Finder

Hi,

So i am trying to index the log file data.log, log file is 2 days old and splunk is indexing only the latest events. Is there a way i can index the older events in data.log ?

0 Karma

isoutamo
SplunkTrust
SplunkTrust
Hi
can you share your clients/UF's inputs.conf stanza for that file?
r. Ismo
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @SS1,

if your system doesn't index logs older than 2 days, probably in your inputs.conf there's an "ignoreOlderThan" option.

So, if you want to index events older than two days you have to disable this option.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Aligning Observability Costs with Business Value: Practical Strategies

 Join us for an engaging Tech Talk on Aligning Observability Costs with Business Value: Practical ...

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...

Splunk Up Your Game: Why It's Time to Embrace Python 3.9+ and OpenSSL 3.0

Did you know that for Splunk Enterprise 9.4, Python 3.9 is the default interpreter? This shift is not just a ...