Splunk Search

Splunk : Logs read after deleting using | delete command

ankithnageshshe
Path Finder

Hello Splunkers,

Lately I had to delete specific source type logs from the index and used the command |delete from the search head.
However when i navigate to the buckets and zcat the journal.gz from the raw data and write it to another file I could read the file.

Is there any way that I could remove the specific sourcetype data from the disk itself.
Index cleaning is not an option for me as I have important logs residing in the same index.

Regards,
Ankith

Tags (1)
0 Karma

MuS
SplunkTrust
SplunkTrust

Hi ankithnageshshetty,

long answer short: no. Not by using any available Splunk commands.
And btw, the delete command only makes events as not searchable, but does not delete any events - see the docs http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Delete#Description

cheers, MuS

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...