Getting Data In

Why were logs indexed at a time when Splunk was not running on the host?

Madhan45
Path Finder

Splunk was running on the time period 00:00 07:00. and stopped at 07:00, but few logs were captured at the time 08:15.

How is it possible?

Tags (3)
0 Karma

ktugwell_splunk
Splunk Employee
Splunk Employee

Could be a couple of reasons but it usually depends on the method in which the logs are collected.

If Splunk is receiving logs from a forwarder, then as soon as Splunk comes back on, the forwarder will forward these queued events with the timestamp of when the log was created.

You could have also had logs indexed during the uptime with a timestamp that is in the future.

Try looking at the _indextime of your logs

 | eval indextime=strftime(_indextime,"%Y-%m-%d %H:%M:%S")
0 Karma
Get Updates on the Splunk Community!

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...