Deployment Architecture

FILTERING

dani9
Explorer

Hi,

I have 2 sources log so much like 2 gb per day just them.

What could I do to limit it? Is possible to set some filters somewhere (where?)

Either is there another way to permit to send less logs from them?

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

hi @dani9,

you can filter logs before indexing so they don't consume license but you cannot use those events.

You can find information about how to filter data at:

https://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Routeandfilterdatad#Filter_event_data...

Ciao.

Giuseppe

0 Karma

skoelpin
SplunkTrust
SplunkTrust

You can use transforms.conf to preprocess your data before indexing it to cut down on your license usage. This includes excluding certain events, cutting white spaces, unneeded characters etc.. 

 

When you scale, you should look into a tool called Cribl which is much easier to use than configuring  transforms

 

https://docs.splunk.com/Documentation/Splunk/latest/Admin/Transformsconf

0 Karma

omerl
Path Finder

What exactly do you want to limit? 

If you want to limit the index size you can use `frozenTimePeriodInSecs` to set auto remove by time or `maxTotalDataSizeMB` to restrict index size, using indexes.conf file

Regarding filtering, you can set filtering rules, depending on the input type you are using - see inputs.conf 

 
 
 
 
0 Karma
Get Updates on the Splunk Community!

Infographic provides the TL;DR for the 2024 Splunk Career Impact Report

We’ve been buzzing with excitement about the recent validation of Splunk Education! The 2024 Splunk Career ...

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...