We recently obtained a Splunk Enterprise license with a 6GB/day limit.
We installed approximately 20 Windows Forwarders and configured them to forward only the Windows Security logs with the exception of our 4 Active Directory servers which we also added AD information to the collection.
As of this morning (day 3), there are only 3,655 events logged total, but our daily quota is already above 25%. We exceeded the quota yesterday.
What could be eating up all the quota, with so few events?
See this link for various method to generate metrics on license usage.
https://answers.splunk.com/answers/4897/how-to-determine-daily-license-usage-in-gb.html
My favorite search is this
index=_internal sourcetype=splunkd source=*license_usage.log type=Usage | bucket span=1d sum(b) as gb by _time FieldToSummarizeOn| eval gb=round(gb/1024/1024/1024,2)
Where FieldToSummarizeOn can be
idx - for index
st - for sourcetype
h - for host
s - for source
thank you! i will give this a go.