Splunk Enterprise

How to drop simular logs

BoldKnowsNothin
Path Finder

Hello comrades!

I just wonder, does splunk detects logs similarity by it's pattern?

Many thanks.

Labels (2)
0 Karma

inventsekar
SplunkTrust
SplunkTrust

Hi @BoldKnowsNothin .. Yes, Splunk detects the "pattern" in the log lines. 

may we know more details from you..  from the subject.. it looks like you want to drop (dont want to ingest) a portion of the logs.. if its correct, pls provide us more details.. 

1) the sample logs..

2) do you have HF or no HF

3) the props.conf / transforms may be needed later. thanks. 

thanks and best regards,
Sekar

PS - If this or any post helped you in any way, pls consider upvoting, thanks for reading !
0 Karma

BoldKnowsNothin
Path Finder

Hello inventsekar,

So let me try to explain this. We started to monitor our docker/containers on splunk. Unfortunately we cannot install splunk forwarders on container. So we using fluent bit to collect all logs from container and grabing logs via httpeventcollector. 

So we cannot use splunk on this scenario.

When containers crushing they spamming exactly same logs(only timestamp different) like there is no tomorrow.

 

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...