Splunk Enterprise

Index events being removed somehow

leekeener
Path Finder

I work for a utility company and, among many things, we have an index for some environmental and system totals. This index is used to to compute yesterday's sales and compare to same day last year, we also do some calculations for one year to date compared to previous year to date. This means that the dashboards may access events two years old. The data is a single event per day, going back to 1995. After loading the data (Which is via DB Connect, from SQL table) everything is great for a while and then one day the data up until about 18 months ago is gone. I am guessing it is being rolled to frozen via some kind of default. What setting should I use to keep all the data in the index and searchable? 

Labels (1)
Tags (2)
0 Karma

somesoni2
Revered Legend

Splunk data can retired either based on age or total size of index. Check the corresponding settings for your index in question. See this Splunk doc for reference.

https://docs.splunk.com/Documentation/Splunk/8.2.2/Indexer/Setaretirementandarchivingpolicy

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please clarify.  Is the data in an index or in a SQL table?  What day did the data disappear?  What are the indexes.conf settings for the index?  How much data is in the index before it starts to disappear?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...