Splunk Enterprise

Index events being removed somehow

Path Finder

I work for a utility company and, among many things, we have an index for some environmental and system totals. This index is used to to compute yesterday's sales and compare to same day last year, we also do some calculations for one year to date compared to previous year to date. This means that the dashboards may access events two years old. The data is a single event per day, going back to 1995. After loading the data (Which is via DB Connect, from SQL table) everything is great for a while and then one day the data up until about 18 months ago is gone. I am guessing it is being rolled to frozen via some kind of default. What setting should I use to keep all the data in the index and searchable? 

Labels (1)
Tags (2)
0 Karma

Revered Legend

Splunk data can retired either based on age or total size of index. Check the corresponding settings for your index in question. See this Splunk doc for reference.


0 Karma


Please clarify.  Is the data in an index or in a SQL table?  What day did the data disappear?  What are the indexes.conf settings for the index?  How much data is in the index before it starts to disappear?

If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk Cloud | Empowering Splunk Administrators with Admin Config Service (ACS)

Greetings, Splunk Cloud Admins and Splunk enthusiasts! The Admin Configuration Service (ACS) team is excited ...

Tech Talk | One Log to Rule Them All

One log to rule them all: how you can centralize your troubleshooting with Splunk logs We know how important ...

Splunk Security Content for Threat Detection & Response, Q1 Roundup

Join Principal Threat Researcher, Michael Haag, as he walks through: An introduction to the Splunk Threat ...