<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Filter logs according to specific criteria before indexing in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Filter-logs-according-to-specific-criteria-before-indexing/m-p/384754#M69171</link>
    <description>&lt;P&gt;I am trying to limit the amount of data that is stored in the indexers; I only want to keep data that would be considered "useful" for our administrators. For example, we have a *nix add-on that runs a script that calls the command 'top' every 2 minutes, but the results from this command blow up the daily indexing usage. &lt;/P&gt;

&lt;P&gt;Is there a way to pre-filter logs according to specific criteria? Could I only store logs where the reported CPU usage is greater than 75%, and not store any logs where that value is lower than the criteria for example? If there is a procedure that would help me tailor many other results to create more compact but useful events that would great.&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jul 2019 15:19:29 GMT</pubDate>
    <dc:creator>ricotries</dc:creator>
    <dc:date>2019-07-11T15:19:29Z</dc:date>
    <item>
      <title>Filter logs according to specific criteria before indexing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filter-logs-according-to-specific-criteria-before-indexing/m-p/384754#M69171</link>
      <description>&lt;P&gt;I am trying to limit the amount of data that is stored in the indexers; I only want to keep data that would be considered "useful" for our administrators. For example, we have a *nix add-on that runs a script that calls the command 'top' every 2 minutes, but the results from this command blow up the daily indexing usage. &lt;/P&gt;

&lt;P&gt;Is there a way to pre-filter logs according to specific criteria? Could I only store logs where the reported CPU usage is greater than 75%, and not store any logs where that value is lower than the criteria for example? If there is a procedure that would help me tailor many other results to create more compact but useful events that would great.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2019 15:19:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filter-logs-according-to-specific-criteria-before-indexing/m-p/384754#M69171</guid>
      <dc:creator>ricotries</dc:creator>
      <dc:date>2019-07-11T15:19:29Z</dc:date>
    </item>
  </channel>
</rss>

