Splunk Enterprise

Index events being removed somehow

Path Finder

I work for a utility company and, among many things, we have an index for some environmental and system totals. This index is used to to compute yesterday's sales and compare to same day last year, we also do some calculations for one year to date compared to previous year to date. This means that the dashboards may access events two years old. The data is a single event per day, going back to 1995. After loading the data (Which is via DB Connect, from SQL table) everything is great for a while and then one day the data up until about 18 months ago is gone. I am guessing it is being rolled to frozen via some kind of default. What setting should I use to keep all the data in the index and searchable? 

Labels (1)
Tags (2)
0 Karma

Revered Legend

Splunk data can retired either based on age or total size of index. Check the corresponding settings for your index in question. See this Splunk doc for reference.


0 Karma


Please clarify.  Is the data in an index or in a SQL table?  What day did the data disappear?  What are the indexes.conf settings for the index?  How much data is in the index before it starts to disappear?

If this reply helps you, an upvote would be appreciated.
0 Karma
*NEW* Splunk Love Promo!
Snag a $25 Visa Gift Card for Giving Your Review!

It's another Splunk Love Special! For a limited time, you can review one of our select Splunk products through Gartner Peer Insights and receive a $25 Visa gift card!


Or Learn More in Our Blog >>