Getting Data In

Truncate only certain events from a source?

maxwee
Engager

Good day experts, to manage the ingestion volume, I need apply truncation to a source that sends pretty high volume of data. However, we do not wish to truncate all events from this source, only certain events which are less critical. I tried to override sourcetype in transforms.conf with a regex that matches less critical events and applying truncate in props.conf to the custom sourcetype but failed. Only then I recalled that the transforms and props apply at indexing time. The transforms worked as expected to change the sourcetype but it did not truncate. 

Does anyone faced similar use case or can share a way to manage this? Thank you in advance.

Labels (3)
0 Karma
1 Solution

PickleRick
SplunkTrust
SplunkTrust

It's not about whether the transforms are applied on index time.

It's about the fact that even though you might overwrite sourcetype, the event's index-time processing will still follow the original sourcetype path, not the new one (unless you use CLONE_SOURCETYPE and discard the original event).

But it's probably easier to use SEDCMD or INGEST_EVAL to selectively "cut" some events.

View solution in original post

maxwee
Engager

thanks for the advice!

0 Karma

PickleRick
SplunkTrust
SplunkTrust

It's not about whether the transforms are applied on index time.

It's about the fact that even though you might overwrite sourcetype, the event's index-time processing will still follow the original sourcetype path, not the new one (unless you use CLONE_SOURCETYPE and discard the original event).

But it's probably easier to use SEDCMD or INGEST_EVAL to selectively "cut" some events.

gcusello
SplunkTrust
SplunkTrust

Hi @maxwee,

you have to find a regex to identify less important events to truncate and then use SEDCMD command in props.conf for that sourcetype.

For more infos see at https://docs.splunk.com/Documentation/Splunk/9.0.3/Admin/Propsconf

Ciao.

Giuseppe

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Unlocking Unified Insights: New Gigamon Federated Search App for Splunk

In today’s data-heavy environment, organizations are caught in a data distribution dilemma. As data volumes ...

GA: New Data Management App in Splunk Platform

Streamlining Data Management: Introducing a unified experience in Splunk Managing data at scale shouldn’t feel ...

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...