Splunk Enterprise

Indexed data vanishes after few hours and cause 0 events for 2 3 hours time frame in a day


I have a Clustered environment and monitoring setup for application logs,universal forwarders push data to indexers .
Lately , I have been facing issue where the application logs are getting indexed and available .
But after few hours when I search for the present day logs on splunk there are 0 events for 2 3 hours time frame and indexed data vanishes.

Not sure if this is a known issue , any help would be of much help.

0 Karma
*NEW* Splunk Love Promo!
Snag a $25 Visa Gift Card for Giving Your Review!

It's another Splunk Love Special! For a limited time, you can review one of our select Splunk products through Gartner Peer Insights and receive a $25 Visa gift card!


Or Learn More in Our Blog >>