<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Selective Indexing and Parsing in Splunk SIEM – Storing Full Logs but Parsing Only Compliance Fields in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758611#M120274</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;Thanks for your Reply.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Feb 2026 03:14:42 GMT</pubDate>
    <dc:creator>amimulahasun</dc:creator>
    <dc:date>2026-02-23T03:14:42Z</dc:date>
    <item>
      <title>Selective Indexing and Parsing in Splunk SIEM – Storing Full Logs but Parsing Only Compliance Fields</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758482#M120253</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;I’m looking for guidance on designing a Splunk SIEM ingestion strategy for the following scenario:&lt;/P&gt;&lt;P&gt;We receive logs from multiple heterogeneous data sources (network devices, applications, servers, cloud services, etc.). Due to storage and licensing constraints, we do &lt;STRONG&gt;not&lt;/STRONG&gt; want to fully index and parse all incoming data.&lt;/P&gt;&lt;P&gt;Our requirement is:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Only index and parse the fields required for compliance use cases (e.g., specific events and fields)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Store the remaining raw log data without parsing&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Ensure the retained raw data is available for audit or forensic purposes if required later&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I would like expert recommendations on the best architectural approach to achieve this.&lt;/P&gt;&lt;P&gt;Specifically:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;What is the recommended method to:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Filter events before indexing?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Route different data streams to separate indexes?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Store non-parsed logs efficiently?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Should we use:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;props.conf and transforms.conf for event filtering?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;NullQueue routing for unwanted events?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Heavy Forwarders for preprocessing?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;SmartStore for raw data retention?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;What is the best practice for:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Index-time vs search-time field extraction in this use case?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Minimizing indexed data volume while maintaining compliance integrity?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Licensing concern:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;If we store the full raw data in Splunk but do not parse or extract fields from it, will it still consume license?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Is license consumption based on ingestion volume regardless of parsing?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Are there supported ways to retain data without impacting license usage?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Has anyone implemented a similar design in a production SIEM environment? What challenges should we expect?&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Any architecture guidance, configuration examples, or real-world lessons learned would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2026 03:33:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758482#M120253</guid>
      <dc:creator>amimulahasun</dc:creator>
      <dc:date>2026-02-19T03:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: Selective Indexing and Parsing in Splunk SIEM – Storing Full Logs but Parsing Only Compliance Fields</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758492#M120256</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/315696"&gt;@amimulahasun&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;at first a question: your requirement is to reduce the license consuption or the storage?&lt;/P&gt;&lt;P&gt;If you want to redure the storeage requirements,&amp;nbsp;the approach should be:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;index all the raw data you need (if there are not useful events, filter them before indexing),&lt;/LI&gt;&lt;LI&gt;parse and save useful fields in Data Models (CIM or custom),&lt;/LI&gt;&lt;LI&gt;use these data for your searches,&lt;/LI&gt;&lt;LI&gt;store raw data in a SmartStore or as frozen data after a little time period (e.g. one month),&lt;/LI&gt;&lt;LI&gt;maintain data in Data Models for the time you need to execute searches,&lt;/LI&gt;&lt;LI&gt;maintain raw data as Smartstore or frozen data for the retention period&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;for audit or forensic purposes.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;If instead you want also to reduce the license, you should:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;analyze your data to understand if you need all the events (if there's some events to discard because not useful) and if you need the full raw data or a part of it to extract the useful fields,&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;remove the not useful events and not useful part of events in props.conf (SEDCMD command),&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;then follow the same previous approach with Data Models and Smartstore or Frozen data.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;Ciao.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Giuseppe&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2026 07:32:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758492#M120256</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2026-02-19T07:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: Selective Indexing and Parsing in Splunk SIEM – Storing Full Logs but Parsing Only Compliance Fields</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758595#M120269</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;First of all Thanks for your reply on my post.&lt;BR /&gt;My requirement is I will Collect Logs form Different sources and stored it in local Storage but for now I have 50GB Per Day License for now for 16 types of log sources. And the count for this 16 types of devices are around 180. My Plan is to store all the raw logs for audit and compliance requirement meetup. But I will index my required security events for these devices. Can you please suggest me the best practice for this type of requirments.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Feb 2026 03:05:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758595#M120269</guid>
      <dc:creator>amimulahasun</dc:creator>
      <dc:date>2026-02-21T03:05:34Z</dc:date>
    </item>
    <item>
      <title>Re: Selective Indexing and Parsing in Splunk SIEM – Storing Full Logs but Parsing Only Compliance Fields</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758598#M120270</link>
      <description>&lt;P&gt;Wait. Are you aware how Splunk works?&lt;/P&gt;&lt;P&gt;In a typical case Splunk indexes raw event but extractions are done in search-time. They are not - as with many other solutions on the market - done during ingestion process so they do not consume disk space. (With the exception of indexed fields and acceleration techniques like datamodel acceleration or report acceleration).&lt;/P&gt;&lt;P&gt;Also license usage is measured (assuming we're talking about ingest-based licensing) based on raw data written to indexes. So however many indexed fields you would have along your raw event, they wouldn't consume any additional license.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Feb 2026 15:24:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758598#M120270</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2026-02-21T15:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: Selective Indexing and Parsing in Splunk SIEM – Storing Full Logs but Parsing Only Compliance Fields</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758604#M120272</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/315696"&gt;@amimulahasun&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;a sI said, to reduce the license consuption, yo should:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;analyze your data to understand if you need all the events (if there's some events to discard because not useful) and if you need the full raw data or a part of it to extract the useful fields,&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;remove the not useful events and not useful part of events in props.conf (SEDCMD command),&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;then follow the same previous approach with Data Models and Smartstore or Frozen data.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;even id it is difficoult to pass from 18o GB/day to 50 GB/day!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Maybe you could try a mixed approach: reduce as much as possible the volume of events to index (using the below process), and enlarge your license.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ciao.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Giuseppe&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Feb 2026 11:39:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758604#M120272</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2026-02-22T11:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: Selective Indexing and Parsing in Splunk SIEM – Storing Full Logs but Parsing Only Compliance Fields</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758611#M120274</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;Thanks for your Reply.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2026 03:14:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758611#M120274</guid>
      <dc:creator>amimulahasun</dc:creator>
      <dc:date>2026-02-23T03:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: Selective Indexing and Parsing in Splunk SIEM – Storing Full Logs but Parsing Only Compliance Fields</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758612#M120275</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;Thanks for your reply. Yes I know&amp;nbsp; how&amp;nbsp;&lt;SPAN&gt;Splunk works. I get your point.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2026 03:16:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Selective-Indexing-and-Parsing-in-Splunk-SIEM-Storing-Full-Logs/m-p/758612#M120275</guid>
      <dc:creator>amimulahasun</dc:creator>
      <dc:date>2026-02-23T03:16:38Z</dc:date>
    </item>
  </channel>
</rss>

