Getting Data In

Why were logs indexed at a time when Splunk was not running on the host?

Madhan45
Path Finder

Splunk was running on the time period 00:00 07:00. and stopped at 07:00, but few logs were captured at the time 08:15.

How is it possible?

Tags (3)
0 Karma

ktugwell_splunk
Splunk Employee
Splunk Employee

Could be a couple of reasons but it usually depends on the method in which the logs are collected.

If Splunk is receiving logs from a forwarder, then as soon as Splunk comes back on, the forwarder will forward these queued events with the timestamp of when the log was created.

You could have also had logs indexed during the uptime with a timestamp that is in the future.

Try looking at the _indextime of your logs

 | eval indextime=strftime(_indextime,"%Y-%m-%d %H:%M:%S")
0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...