<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why am I receiving too many Splunk logs on audit.log? in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423729#M11734</link>
    <description>&lt;P&gt;i found that the amount of events indexed was related to DELETE and CREATE actions made by splunkd over the .CSV files&lt;BR /&gt;
Any ideas why splunkd deletes and creates the .csv lookup files?&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/6650iDCECC0F953C6045A/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Mar 2019 19:05:23 GMT</pubDate>
    <dc:creator>jnahuelperez35</dc:creator>
    <dc:date>2019-03-06T19:05:23Z</dc:date>
    <item>
      <title>Why am I receiving too many Splunk logs on audit.log?</title>
      <link>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423726#M11731</link>
      <description>&lt;P&gt;Hi everyone! &lt;/P&gt;

&lt;P&gt;i logged into my search head and found that the main indexer was at 98% of the total capacity. So i started to look for which host/sourcetype was causing this. I found the search head itself was indexing too many events from audit.og (it has installed the splunk_TA_nix addon). Some examples are:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;type=PATH msg=audit(1551884420.778:495054861): item=4 name="/opt/splunk/var/run/splunk/dispatch/scheduler_[some_data]__search__[some_data]/[some_file_name].csv" inode=35130128 dev=ca:60 mode=0100600 ouid=0 ogid=0 rdev=00:00 nametype=CREATE
type=PATH msg=audit(1551884420.778:495054861): item=3 name="/opt/splunk/var/run/splunk/dispatch/scheduler_[some_data]___search__[some_data]__at_1551884400_30928/[some_file_name]_.csv" inode=35129880 dev=ca:60 mode=0100600 ouid=0 ogid=0 rdev=00:00 nametype=DELETE
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So i made the next search to check which services were generating this logs&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=main host="MY_SEARCH_HEAD"  source="/var/log/audit/audit.log" 
| eval PATH=case(name LIKE "%/opt/splunk/%", "OPT Splunk", name LIKE "%/volr/splunk%", "Volr Splunk")
| stats  count by PATH  
| eventstats  sum(count) as perc  
| eval  perc=round(count*100/perc,2)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The result is the next one:&lt;/P&gt;

&lt;P&gt;PATH: OPT Splunk Count: 2749262+ perc: 75%&lt;BR /&gt;
PATH: Volr Splunk Count: 2749262+ perc: 24%&lt;/P&gt;

&lt;P&gt;Why are this logs being generated, and how can i not overload my indexer?&lt;/P&gt;

&lt;P&gt;Thanks for reading!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 23:34:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423726#M11731</guid>
      <dc:creator>jnahuelperez35</dc:creator>
      <dc:date>2020-09-29T23:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: Why am I receiving too many Splunk logs on audit.log?</title>
      <link>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423727#M11732</link>
      <description>&lt;P&gt;I assume you have a single instance acting as SH and indexer. You would need to look at all data sources sending data to 'index=main' and the frequency of the data [ e.g. interval parameter in inputs.conf]. If you need to adjust them to reduce the events, that could reduce the events/sec indexed.&lt;/P&gt;

&lt;P&gt;Additionally you would also need to setup a retention policy/size on your 'main' and other indexes, so you do not run out of disk space.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.4/Indexer/Setaretirementandarchivingpolicy"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.4/Indexer/Setaretirementandarchivingpolicy&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 16:12:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423727#M11732</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2019-03-06T16:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: Why am I receiving too many Splunk logs on audit.log?</title>
      <link>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423728#M11733</link>
      <description>&lt;P&gt;i have a single instance that is acting as indexer and search head. but in this case, the events come from the same Search Head. So i would like to know what kind of events are those that i share and how can i except them to not be indexed. I need to know what caused this amount of data to start being indexed. Meaby debug mode or something?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 16:45:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423728#M11733</guid>
      <dc:creator>jnahuelperez35</dc:creator>
      <dc:date>2019-03-06T16:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: Why am I receiving too many Splunk logs on audit.log?</title>
      <link>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423729#M11734</link>
      <description>&lt;P&gt;i found that the amount of events indexed was related to DELETE and CREATE actions made by splunkd over the .CSV files&lt;BR /&gt;
Any ideas why splunkd deletes and creates the .csv lookup files?&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/6650iDCECC0F953C6045A/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 19:05:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423729#M11734</guid>
      <dc:creator>jnahuelperez35</dc:creator>
      <dc:date>2019-03-06T19:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: Why am I receiving too many Splunk logs on audit.log?</title>
      <link>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423730#M11735</link>
      <description>&lt;P&gt;This is becoming nasty...i found CSV are not the only files. The mission of audit.log is to log any user action taken (or system action also) So i belive the best solution to this problem y to directly  except this eventos from being indexed over audit.log&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 19:31:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423730#M11735</guid>
      <dc:creator>jnahuelperez35</dc:creator>
      <dc:date>2019-03-06T19:31:16Z</dc:date>
    </item>
    <item>
      <title>Re: Why am I receiving too many Splunk logs on audit.log?</title>
      <link>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423731#M11736</link>
      <description>&lt;P&gt;The issue you have is this. &lt;/P&gt;

&lt;P&gt;You have installed the ta-nix app which monitors audit events on your Splunk server. &lt;/P&gt;

&lt;P&gt;When a file is modified on the Splunk server, an event is generated in audit.log&lt;/P&gt;

&lt;P&gt;Splunk then indexes audit.log, and writes the result to the Splunk index, in /opt/Splunk/var/....&lt;/P&gt;

&lt;P&gt;This in turn generates a new event in audit.log which...you guessed it, gets indexed, and written, and triggers another event in audit.log&lt;/P&gt;

&lt;P&gt;As well as writing index files, your searches are also creating objects in the same path, so your Splunk server is eating itself!&lt;/P&gt;

&lt;P&gt;Two solutions:&lt;BR /&gt;
A.) reconfigure the auditd service to ignore changes in the /opt/Splunk/var/ paths&lt;BR /&gt;
B.) configure the ta-nix app to ignore audit.log on Splunk servers. &lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 20:23:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Why-am-I-receiving-too-many-Splunk-logs-on-audit-log/m-p/423731#M11736</guid>
      <dc:creator>nickhills</dc:creator>
      <dc:date>2019-03-06T20:23:53Z</dc:date>
    </item>
  </channel>
</rss>

