Hello, we had a multiday outage regarding the connectivity between the UFs and the IDXs. This affected the ability of all the UFs (5k or so) from sending logs to Splunk from our Windows servers. Once that connectivity was restored, for reasons yet to be determined, the UFs did not backfill, but kept sending current data. What I'm saying is, the UFs for some reason did not realized that they could not send data and did not pause in their transmission. Thus, we have about a 22 hour gap in our windows logs. We are trying to figure out how to get Splunk to re-ingest that data. All the searches I have found for re-ingestion of windows logs talk about deleting the checkpoint file for the time period and restarting Splunk. That would work for one or a few servers, but we need to do that at scale. It seems the options for re-ingestion past data at scale are limited to: 1. Use something like SCCM to script the stop of Splunk UF, deletion of checkpoint files, and restart Splunk UF 2. Use something like SCCM to completely uninstall Splunk UF and reinstall with a inputs.conf that covers the missing timeframe, but realize we will duplicate everything after that. Is there another option? Thanks What I have found so far, but seems like it would only work for a few servers, not 5k https://splunk.my.site.com/customer/s/article/Splunk-UF-not-onboarding-Previous-Winevent-Security-logs https://community.splunk.com/t5/Getting-Data-In/How-do-I-trigger-the-re-indexing-of-events-from-a-locally/m-p/68917
... View more