Splunk Search

Splunk : Logs read after deleting using | delete command

ankithnageshshe
Path Finder

Hello Splunkers,

Lately I had to delete specific source type logs from the index and used the command |delete from the search head.
However when i navigate to the buckets and zcat the journal.gz from the raw data and write it to another file I could read the file.

Is there any way that I could remove the specific sourcetype data from the disk itself.
Index cleaning is not an option for me as I have important logs residing in the same index.

Regards,
Ankith

Tags (1)
0 Karma

MuS
Legend

Hi ankithnageshshetty,

long answer short: no. Not by using any available Splunk commands.
And btw, the delete command only makes events as not searchable, but does not delete any events - see the docs http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Delete#Description

cheers, MuS

0 Karma
Get Updates on the Splunk Community!

How to Monitor Google Kubernetes Engine (GKE)

We’ve looked at how to integrate Kubernetes environments with Splunk Observability Cloud, but what about ...

Index This | How can you make 45 using only 4?

October 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Splunk Education Goes to Washington | Splunk GovSummit 2024

If you’re in the Washington, D.C. area, this is your opportunity to take your career and Splunk skills to the ...