Splunk Search

Splunk : Logs read after deleting using | delete command

ankithnageshshe
Path Finder

Hello Splunkers,

Lately I had to delete specific source type logs from the index and used the command |delete from the search head.
However when i navigate to the buckets and zcat the journal.gz from the raw data and write it to another file I could read the file.

Is there any way that I could remove the specific sourcetype data from the disk itself.
Index cleaning is not an option for me as I have important logs residing in the same index.

Regards,
Ankith

Tags (1)
0 Karma

MuS
SplunkTrust
SplunkTrust

Hi ankithnageshshetty,

long answer short: no. Not by using any available Splunk commands.
And btw, the delete command only makes events as not searchable, but does not delete any events - see the docs http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Delete#Description

cheers, MuS

0 Karma
Get Updates on the Splunk Community!

See Splunk Platform & Observability Innovations at Cisco Live EMEA

Hi Splunkers, Learn about what’s next for Splunk Platform at Cisco Live EMEA.  Data silos are a big challenge ...

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...