Why is the Splunk Web service not running after an upgrade to 6.2? Learn more »
I was testing splunk by adding multiple servers by both syslog and splunk forwarder. But now my splunk indexer has all kinds of stuff that I don't need anymore.
I want to remove some hosts, source and source types and the data it contains. Per the document I should be able to delete by removing stanzas in indexes.conf. But i can't find the entries in it.
Please help me out.
to stop new events from coming into your indexes - remove the
[monitor] and TCP/UDP stanzas in
inputs.conf or go through the GUI to remove them. This, however does not remove any data already indexed.
If you delete stuff from indexes.conf, you remove the reference to where the indexes are located on disk. I don't think that's what you want.
If you selectively want to remove some of the information in the indexes you otherwise wish to keep - then you should type in a search that selects those events and pipe them to
Make sure that your user role has the
can_delete privilege (Manager -> Access Control -> Roles -> your_role ). Then, assuming you have data from one host (badhost) you wish to delete and data from another host (goodhost) you wish to keep:
host=badhost | delete
Whoops, now all data from badhost is gone. However, the data from goodhost is of two different sourcetypes (badtype and goodtype) - guess what:
host=goodhost sourcetype=badtype | delete
..and it's gone as well.
You should note that this operation does NOT actually delete the data, it just prevents it from ever being returned as search results.
If you want to clean an index completely, then you should do so through the command line:
/opt/splunk/bin/splunk clean eventdata -index <the index you wish to clean>
For more information regarding the clean command see: http://splunk-base.splunk.com/answers/8191/is-there-a-way-to-clean-event-data-from-a-specific-date-range
hope this helps,
EDIT: Missed a parameter in the clean command... oops. fixed now.