Getting Data In

Why doesn't Splunk index old events in same log file?

SS1
Path Finder

Hi,

So i am trying to index the log file data.log, log file is 2 days old and splunk is indexing only the latest events. Is there a way i can index the older events in data.log ?

0 Karma

isoutamo
SplunkTrust
SplunkTrust
Hi
can you share your clients/UF's inputs.conf stanza for that file?
r. Ismo
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @SS1,

if your system doesn't index logs older than 2 days, probably in your inputs.conf there's an "ignoreOlderThan" option.

So, if you want to index events older than two days you have to disable this option.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Security Professional: Sharpen Your Defenses with These .conf25 Sessions

Sooooooooooo, guess what. .conf25 is almost here, and if you're on the Security Learning Path, this is your ...

First Steps with Splunk SOAR

Our first step was to gather a list of the playbooks we wanted and to sort them by priority.  Once this list ...

How To Build a Self-Service Observability Practice with Splunk Observability Cloud

If you’ve read our previous post on self-service observability, you already know what it is and why it ...