license violation

New Member

Hi, I'm new to splunk and we just bought a 500 MB license. I capture windows events however we always overshoot our license at 9AM. I monitor about 30 windows 2008 servers and they generate a lot of logs. How do I filter the logs that we do not need? Most of the event logs are just noise.


Armando A.

Tags (1)
0 Karma

Ultra Champion

Briang67 advice is a good start, but it might be a lot easier to actually do the nullQueueing on the indexer instead.

It all depends on how data is gathered (UF, HF, WMI, Snare (or similar)). Also, with heavy forwarders you'd have a lot of remote configurations to consider, since you'd be doing the nullQueue filtering on each host generating data. If you are new to the product, you might not want to have to learn how to handle Deployment Server as well.

The penalty for doing the nullQueue filtering on the indexer is that you'll have to transmit the data over the network before discarding it. However, if you currently have 500 MB in 9 hours, you probably have less than 5GB over a full day (since the load is probably not even throughout the day). 5GB of network traffic is not all that much, unless you have really slow links to travel.



might be this link useful for you

and you can also try blacklist some file if you really don't need.

0 Karma


You can do this by installing the heavy forwarder and setting up a transform to send the unwanted events to a "null queue". This link details the setup:
Route and filter data

Get Updates on the Splunk Community!

Using Machine Learning for Hunting Security Threats

WATCH NOW Seeing the exponential hike in global cyber threat spectrum, organizations are now striving more for ...

Observability Newsletter Highlights | March 2023

 March 2023 | Check out the latest and greatestSplunk APM's New Tag Filter ExperienceSplunk APM has updated ...

Security Newsletter Updates | March 2023

 March 2023 | Check out the latest and greatestUnify Your Security Operations with Splunk Mission Control The ...