Splunk Search

Splunk clean eventdata using duration

dhana02v
New Member

Hi Splunk Team,

There is an option to clear entire indexed data using the command "./splunk clean eventdata", it will delete entire data which has been indexed if it has for 3 months.

But my requirements to delete the indexed data for 10 or 30 minutes, is there any option to delete the indexed data using duration.

Thanks in advance.

Warm Regards,
Dhanasekaran.M

Tags (1)
0 Karma

gkanapathy
Splunk Employee
Splunk Employee

Here is what you can do:

http://docs.splunk.com/Documentation/Splunk/5.0.2/Indexer/RemovedatafromSplunk

It is possible to delete entire "buckets" of data if you know what you are doing. Using the dbinspect command, you can find the buckets that contain data from the time range of interest, then stop and remove the directories. However, this will almost certainly also remove information that is outside of the data you're looking for, unless you're quite lucky.

martin_mueller
SplunkTrust
SplunkTrust

No. You can hide data selectively using the delete command, but this will not clear up disk space.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...