Getting Data In

How to find what is causing us to go over our daily license quota with so few events indexed?


We recently obtained a Splunk Enterprise license with a 6GB/day limit.

We installed approximately 20 Windows Forwarders and configured them to forward only the Windows Security logs with the exception of our 4 Active Directory servers which we also added AD information to the collection.

As of this morning (day 3), there are only 3,655 events logged total, but our daily quota is already above 25%. We exceeded the quota yesterday.

What could be eating up all the quota, with so few events?

0 Karma

Revered Legend

See this link for various method to generate metrics on license usage.

My favorite search is this

index=_internal sourcetype=splunkd source=*license_usage.log type=Usage | bucket span=1d sum(b) as gb by _time FieldToSummarizeOn| eval gb=round(gb/1024/1024/1024,2)

Where FieldToSummarizeOn can be

 idx - for index
 st - for sourcetype
 h - for host
 s - for source


thank you! i will give this a go.

0 Karma
.conf21 Now Fully Virtual!
Register for FREE Today!

We've made .conf21 totally virtual and totally FREE! Our completely online experience will run from 10/19 through 10/20 with some additional events, too!