Getting Data In

How to find what is causing us to go over our daily license quota with so few events indexed?

Engager

We recently obtained a Splunk Enterprise license with a 6GB/day limit.

We installed approximately 20 Windows Forwarders and configured them to forward only the Windows Security logs with the exception of our 4 Active Directory servers which we also added AD information to the collection.

As of this morning (day 3), there are only 3,655 events logged total, but our daily quota is already above 25%. We exceeded the quota yesterday.

What could be eating up all the quota, with so few events?

0 Karma

SplunkTrust
SplunkTrust

See this link for various method to generate metrics on license usage.

https://answers.splunk.com/answers/4897/how-to-determine-daily-license-usage-in-gb.html

My favorite search is this

index=_internal sourcetype=splunkd source=*license_usage.log type=Usage | bucket span=1d sum(b) as gb by _time FieldToSummarizeOn| eval gb=round(gb/1024/1024/1024,2)

Where FieldToSummarizeOn can be

 idx - for index
 st - for sourcetype
 h - for host
 s - for source

Explorer

thank you! i will give this a go.

0 Karma