<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: query to find the forwarders sending too much data in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/query-to-find-the-forwarders-sending-too-much-data/m-p/303239#M91235</link>
    <description>&lt;P&gt;Hi kteng,2024&lt;BR /&gt;
| stats count will give you count of events but not how large the events are.&lt;BR /&gt;
considering each forwarder is on a host and you would like to see which host sends the most data (in volume not count) you can look at the license master. here's a sample search to run manually as well:&lt;BR /&gt;
    earliest=-1d@d latest=@d  index=_internal source=&lt;EM&gt;license_usage.log&lt;/EM&gt; type=Usage&lt;BR /&gt;
    | stats sum(b) AS Bytes by h&lt;BR /&gt;
    | eval GB = Bytes/1024/1024/1024&lt;BR /&gt;
    | table h GB&lt;BR /&gt;
    | sort -GB&lt;BR /&gt;
    | addcoltotals&lt;/P&gt;

&lt;P&gt;you can play with earliest and latest to pick your time or just puse time picker&lt;BR /&gt;
you can also filter by other parameters then h&lt;BR /&gt;
i = index&lt;BR /&gt;
h = host&lt;BR /&gt;
st = sourcetype&lt;/P&gt;

&lt;P&gt;Cheers&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 13:28:07 GMT</pubDate>
    <dc:creator>adonio</dc:creator>
    <dc:date>2020-09-29T13:28:07Z</dc:date>
    <item>
      <title>query to find the forwarders sending too much data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/query-to-find-the-forwarders-sending-too-much-data/m-p/303238#M91234</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Below is the query i am using to find the forwarders sending more data than others for a specific sourcetype&lt;/P&gt;

&lt;P&gt;index=index-name sourcetype=sourcetype-name | stats count by host | sort - count&lt;/P&gt;

&lt;P&gt;is the above query  correct ?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2017 14:51:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/query-to-find-the-forwarders-sending-too-much-data/m-p/303238#M91234</guid>
      <dc:creator>kteng2024</dc:creator>
      <dc:date>2017-03-28T14:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: query to find the forwarders sending too much data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/query-to-find-the-forwarders-sending-too-much-data/m-p/303239#M91235</link>
      <description>&lt;P&gt;Hi kteng,2024&lt;BR /&gt;
| stats count will give you count of events but not how large the events are.&lt;BR /&gt;
considering each forwarder is on a host and you would like to see which host sends the most data (in volume not count) you can look at the license master. here's a sample search to run manually as well:&lt;BR /&gt;
    earliest=-1d@d latest=@d  index=_internal source=&lt;EM&gt;license_usage.log&lt;/EM&gt; type=Usage&lt;BR /&gt;
    | stats sum(b) AS Bytes by h&lt;BR /&gt;
    | eval GB = Bytes/1024/1024/1024&lt;BR /&gt;
    | table h GB&lt;BR /&gt;
    | sort -GB&lt;BR /&gt;
    | addcoltotals&lt;/P&gt;

&lt;P&gt;you can play with earliest and latest to pick your time or just puse time picker&lt;BR /&gt;
you can also filter by other parameters then h&lt;BR /&gt;
i = index&lt;BR /&gt;
h = host&lt;BR /&gt;
st = sourcetype&lt;/P&gt;

&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:28:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/query-to-find-the-forwarders-sending-too-much-data/m-p/303239#M91235</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2020-09-29T13:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: query to find the forwarders sending too much data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/query-to-find-the-forwarders-sending-too-much-data/m-p/303240#M91236</link>
      <description>&lt;P&gt;Firstly, I would use a tstats for this (using only metadata fields) type of queries.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstasts count WHERE index=index-name sourcetype=sourcetype-name by host | sort - count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Second, when you say more data, it could be more number of events or more amount of data being sent. You got the query for number of events. For amount of data, you would need to user license usage logs, something like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal source=*license_usage.log type=Usage idx=index-name st=sourcetype-name | stats sum(b) as usage by h | sort -usage
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 28 Mar 2017 15:01:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/query-to-find-the-forwarders-sending-too-much-data/m-p/303240#M91236</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-03-28T15:01:16Z</dc:date>
    </item>
  </channel>
</rss>

