Getting Data In

Why were logs indexed at a time when Splunk was not running on the host?

Madhan45
Path Finder

Splunk was running on the time period 00:00 07:00. and stopped at 07:00, but few logs were captured at the time 08:15.

How is it possible?

Tags (3)
0 Karma

ktugwell_splunk
Splunk Employee
Splunk Employee

Could be a couple of reasons but it usually depends on the method in which the logs are collected.

If Splunk is receiving logs from a forwarder, then as soon as Splunk comes back on, the forwarder will forward these queued events with the timestamp of when the log was created.

You could have also had logs indexed during the uptime with a timestamp that is in the future.

Try looking at the _indextime of your logs

 | eval indextime=strftime(_indextime,"%Y-%m-%d %H:%M:%S")
0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...