Getting Data In

Failed Logs starting at 12am and ending at 11:59pm

Joshbiz1
New Member

Hello,
I am using the free version of the splunk and I just want to see the days log files from all the servers I have in my remote event log collections. Is there a way to store the old ones per day as well?
I would like to start the logs from today and not from when the day the servers were turned on?

Is there a way to get these things done?

Thank you,
Josh

Tags (3)
0 Karma

rovechkin_splun
Splunk Employee
Splunk Employee

if you plan to produce daily logs every day then you end up indexing the whole event history. Then there is no need to do "day filtering", but instead you can build views which show only today's events.

0 Karma

MuS
Legend

Hi Joshbiz

I can think of two ways you could achieve this:

  1. splunk reads all what there is in a log files, so if the log file only contains today data when you start splunk you will get only todays data.
  2. route older data to the null queue, you can filter and route any older data to the null queue this way it will not be indexed. read more in the docs

hope I got your question right and it helps a bit....

cheers

0 Karma
Get Updates on the Splunk Community!

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...