Splunk Enterprise

replace string in log

sarit_s
Communicator

Hello

I have logs that contains some string that i want to replace with *** 

i want to to be permanent and not only in search time.

is it possible ?

p.s - i don't have the log files anymore so i cannot delete and index again

 

thanks

Labels (1)
Tags (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

If it's a very sensitive issue, you might try to export the events from the whole index (or probably you could try exporting raw data from a single bucket with help from Splunk Professional Services), delete index files from server's disk, modify the exported events "offline" and ingest them again. But it's a very cumbersome process.

In general, once the data is indexed, it's immutable and stays in the index until it expires or is being pushed out because of index size limit. Even the delete operation does not really delete data from index files, it just marks the events as unsearchable.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Once data is indexed it cannot be edited, modified, changed, replaced, or altered in any way.  Any replacements will have to be at search time.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...