Getting Data In

How to Remove the data getting indexed?

Inayath_khan
Path Finder

Hi Folks,

Can anyone suggest how to remove the below data getting indexed to indexer and also how to remove the data which is already indexed?

timestamp syslog_host user remote_host connection_id query_id operation database object

Labels (1)
Tags (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @Inayath_khan,
Splunk isn't a database, so you cannot modify or remove data after indexing:

Ciao.
Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Inayath_khan,
Splunk isn't a database, so you cannot modify or remove data after indexing:

Ciao.
Giuseppe

0 Karma

Inayath_khan
Path Finder

Thanks @gcusello can you help me at a configuration level what changes has to be made to stop selective data getting indexed?

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Inayath_khan,
as described at https://docs.splunk.com/Documentation/Splunk/8.0.2/Forwarding/Routeandfilterdatad#Filter_event_data_... , you can filter data before indexing in two ways:

  • take all the data and delete some identified events,
  • delete all the data and take identified events.

In both cases you have to follow these steps:

  • identify events to filter (sourcetype or source or host);
  • identify rule to discard or take logs (regex);
  • modify props.conf and transforms.conf on indexers or (when present) on Heavy Forwarders;
  • put props.conf and transforms.conf in an App (better) or in $SPLUNK_HOME/etc/system/local .

Discard specific events and keep the rest:
In props.conf, set the TRANSFORMS-null attribute:

[your_sourcetype]
TRANSFORMS-null= setnull

in transforms.conf, set DEST_KEY to "queue" and FORMAT to "nullQueue":

[setnull]
REGEX = your_regex
DEST_KEY = queue
FORMAT = nullQueue

At the end restart Splunk Enterprise.

Keep specific events and discard the rest
In props.conf:

[your_sourcetype]
TRANSFORMS-set= setnull,setparsing

In transforms.conf:

[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX = your-regex
DEST_KEY = queue
FORMAT = indexQueue

At the end restart Splunk Enterprise.

Ciao.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...

Brains, Bytes, and Boston: Learn from the Best at .conf25

When you think of Boston, you might picture colonial charm, world-class universities, or even the crack of a ...