Splunk Search

Finding entries deleted from log

trodenbaugh
Explorer

I'm working with an application that adds an entry to a log file, updates the status of that entry as it progresses and then deletes the entry when it is complete. I'm trying to identify when the application may be stopped for longer than 4 hours. Transactions seem to work to capture the progression of the application, there are instances where the application gets an error and removes the entry without updating the status.

Is there a search to determine when the entry was removed from the log?

Tags (1)
0 Karma

jbsplunk
Splunk Employee
Splunk Employee

you could use fschange to index the file and compare it to previously indexed instances of the file.

http://docs.splunk.com/Documentation/Splunk/latest/Data/Monitorchangestoyourfilesystem

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...