Getting Data In

How to find what is causing us to go over our daily license quota with so few events indexed?

mj_hpg
Engager

We recently obtained a Splunk Enterprise license with a 6GB/day limit.

We installed approximately 20 Windows Forwarders and configured them to forward only the Windows Security logs with the exception of our 4 Active Directory servers which we also added AD information to the collection.

As of this morning (day 3), there are only 3,655 events logged total, but our daily quota is already above 25%. We exceeded the quota yesterday.

What could be eating up all the quota, with so few events?

0 Karma

somesoni2
Revered Legend

See this link for various method to generate metrics on license usage.

https://answers.splunk.com/answers/4897/how-to-determine-daily-license-usage-in-gb.html

My favorite search is this

index=_internal sourcetype=splunkd source=*license_usage.log type=Usage | bucket span=1d sum(b) as gb by _time FieldToSummarizeOn| eval gb=round(gb/1024/1024/1024,2)

Where FieldToSummarizeOn can be

 idx - for index
 st - for sourcetype
 h - for host
 s - for source

agentguerry
Path Finder

thank you! i will give this a go.

0 Karma
Get Updates on the Splunk Community!

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...