Deployment Architecture

FILTERING

dani9
Explorer

Hi,

I have 2 sources log so much like 2 gb per day just them.

What could I do to limit it? Is possible to set some filters somewhere (where?)

Either is there another way to permit to send less logs from them?

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

hi @dani9,

you can filter logs before indexing so they don't consume license but you cannot use those events.

You can find information about how to filter data at:

https://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Routeandfilterdatad#Filter_event_data...

Ciao.

Giuseppe

0 Karma

skoelpin
SplunkTrust
SplunkTrust

You can use transforms.conf to preprocess your data before indexing it to cut down on your license usage. This includes excluding certain events, cutting white spaces, unneeded characters etc.. 

 

When you scale, you should look into a tool called Cribl which is much easier to use than configuring  transforms

 

https://docs.splunk.com/Documentation/Splunk/latest/Admin/Transformsconf

0 Karma

omerl
Path Finder

What exactly do you want to limit? 

If you want to limit the index size you can use `frozenTimePeriodInSecs` to set auto remove by time or `maxTotalDataSizeMB` to restrict index size, using indexes.conf file

Regarding filtering, you can set filtering rules, depending on the input type you are using - see inputs.conf 

 
 
 
 
0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In March, the Splunk Threat Research Team had 2 releases of security content via the Enterprise Security ...

Join the Splunk Developer Program Hackathon: Splunk Build-a-thon!

The Splunk Developer Program is launching in beta, and we’re celebrating with an exciting hackathon! This is ...

Announcing the Expansion of the Splunk Academic Alliance Program

The Splunk Community is more than just an online forum — it’s a network of passionate users, administrators, ...