Getting Data In

Failed Logs starting at 12am and ending at 11:59pm

Joshbiz1
New Member

Hello,
I am using the free version of the splunk and I just want to see the days log files from all the servers I have in my remote event log collections. Is there a way to store the old ones per day as well?
I would like to start the logs from today and not from when the day the servers were turned on?

Is there a way to get these things done?

Thank you,
Josh

Tags (3)
0 Karma

rovechkin_splun
Splunk Employee
Splunk Employee

if you plan to produce daily logs every day then you end up indexing the whole event history. Then there is no need to do "day filtering", but instead you can build views which show only today's events.

0 Karma

MuS
Legend

Hi Joshbiz

I can think of two ways you could achieve this:

  1. splunk reads all what there is in a log files, so if the log file only contains today data when you start splunk you will get only todays data.
  2. route older data to the null queue, you can filter and route any older data to the null queue this way it will not be indexed. read more in the docs

hope I got your question right and it helps a bit....

cheers

0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...