Deployment Architecture

FILTERING

dani9
Explorer

Hi,

I have 2 sources log so much like 2 gb per day just them.

What could I do to limit it? Is possible to set some filters somewhere (where?)

Either is there another way to permit to send less logs from them?

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

hi @dani9,

you can filter logs before indexing so they don't consume license but you cannot use those events.

You can find information about how to filter data at:

https://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Routeandfilterdatad#Filter_event_data...

Ciao.

Giuseppe

0 Karma

skoelpin
SplunkTrust
SplunkTrust

You can use transforms.conf to preprocess your data before indexing it to cut down on your license usage. This includes excluding certain events, cutting white spaces, unneeded characters etc.. 

 

When you scale, you should look into a tool called Cribl which is much easier to use than configuring  transforms

 

https://docs.splunk.com/Documentation/Splunk/latest/Admin/Transformsconf

0 Karma

omerl
Path Finder

What exactly do you want to limit? 

If you want to limit the index size you can use `frozenTimePeriodInSecs` to set auto remove by time or `maxTotalDataSizeMB` to restrict index size, using indexes.conf file

Regarding filtering, you can set filtering rules, depending on the input type you are using - see inputs.conf 

 
 
 
 
0 Karma
Get Updates on the Splunk Community!

Index This | What’s a riddle wrapped in an enigma?

September 2025 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

BORE at .conf25

Boss Of Regular Expression (BORE) was an interactive session run again this year at .conf25 by the brilliant ...

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...