<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic license violation in Security</title>
    <link>https://community.splunk.com/t5/Security/license-violation/m-p/34210#M13765</link>
    <description>&lt;P&gt;using the Splunk License Usage App to get breakdown of index usage by index,host,source,sourcetype&lt;BR /&gt;
however what i would really like is usage by event_type. I'm assuming one of the reasons my index are large on the above items is because the users have setup event_type rules that are to generic and by making the rules more specific i csn cut down on index volume? Am i looking at this correctly? I'm new to splunk so please forgive the ignorance&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 11:42:47 GMT</pubDate>
    <dc:creator>edwinbmiller</dc:creator>
    <dc:date>2020-09-28T11:42:47Z</dc:date>
    <item>
      <title>license violation</title>
      <link>https://community.splunk.com/t5/Security/license-violation/m-p/34210#M13765</link>
      <description>&lt;P&gt;using the Splunk License Usage App to get breakdown of index usage by index,host,source,sourcetype&lt;BR /&gt;
however what i would really like is usage by event_type. I'm assuming one of the reasons my index are large on the above items is because the users have setup event_type rules that are to generic and by making the rules more specific i csn cut down on index volume? Am i looking at this correctly? I'm new to splunk so please forgive the ignorance&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 11:42:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/license-violation/m-p/34210#M13765</guid>
      <dc:creator>edwinbmiller</dc:creator>
      <dc:date>2020-09-28T11:42:47Z</dc:date>
    </item>
    <item>
      <title>Re: license violation</title>
      <link>https://community.splunk.com/t5/Security/license-violation/m-p/34211#M13766</link>
      <description>&lt;P&gt;Event type rules (eventtypes.conf) are done at search time, and don't count against your indexing limit.  The licensing usage only applies to &lt;EM&gt;raw&lt;/EM&gt; data coming in from your log sources.  If you are collecting from a large number of hosts, or large number of files, you can do searches like:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| metadata type=hosts&lt;/CODE&gt;  OR &lt;CODE&gt;| metadata type=sources&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;The number shown in the "events" column is the number of log events from that host (or input file).  This can help to identify "noisy" hosts.  You could then do a search for that host (again, or logfile) to look at the log events, to then see the contents of that log data.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2012 14:35:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/license-violation/m-p/34211#M13766</guid>
      <dc:creator>sowings</dc:creator>
      <dc:date>2012-04-24T14:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: license violation</title>
      <link>https://community.splunk.com/t5/Security/license-violation/m-p/34212#M13767</link>
      <description>&lt;P&gt;thanks for the clarification, so the only way to reduce usage is reduce the rate of syslogs entries being generated by chatty hosts?&lt;BR /&gt;
It would be great if there was a way to discard unwanted syslog or other data source entries so they would not be counted against the license.&lt;BR /&gt;
After all why should i pay for data i don't even need.&lt;BR /&gt;
Often filtering output directly from a source is hard.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Apr 2012 01:58:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/license-violation/m-p/34212#M13767</guid>
      <dc:creator>edwinbmiller</dc:creator>
      <dc:date>2012-04-25T01:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: license violation</title>
      <link>https://community.splunk.com/t5/Security/license-violation/m-p/34213#M13768</link>
      <description>&lt;P&gt;You can filter out specific events (be careful that the regex is not too general!) by using the nullQueue.  There are some tips &lt;A href="http://splunk-base.splunk.com/answers/9293/problem-routing-events-to-nullqueue"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Apr 2012 02:07:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/license-violation/m-p/34213#M13768</guid>
      <dc:creator>sowings</dc:creator>
      <dc:date>2012-04-25T02:07:10Z</dc:date>
    </item>
  </channel>
</rss>

