Getting Data In

monitoring directories - once indexed, do I need to keep original source data?

rgonzale6
Path Finder

If I'm simply monitoring a directory and I'm not tailing it, do I need to keep the contents of the directory after it's been indexed? I have no forensic need for the source data.

I've done some small scale testing with this by creating a test file in a monitoring directory, getting it indexed, and then deleting it, and it still shows up in splunk in the relevant index which would seem to me to indicate you do not need to keep the source data.

Tags (1)
1 Solution

hulahoop
Splunk Employee
Splunk Employee

You are correct--the original data source can be removed after indexing. Splunk no longer requires it as a separate copy is now stored in the Splunk datastore. Having said that, you should ensure the appropriate protections are taken to protect and preserve the data in Spllunk should there be any software/hardware failures.

View solution in original post

hulahoop
Splunk Employee
Splunk Employee

You are correct--the original data source can be removed after indexing. Splunk no longer requires it as a separate copy is now stored in the Splunk datastore. Having said that, you should ensure the appropriate protections are taken to protect and preserve the data in Spllunk should there be any software/hardware failures.

rgonzale6
Path Finder

Thanks! Much appreciated.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...