Splunk Enterprise

How to filter fields in my logs before to index in splunk enterprise using ingest actions?


Hello, I need help to filter fields of an event and in this way reduce the size of the log before indexing it in splunk, I was reviewing the documentation and using ingest actions it is possible to exclude events based on regular expressions, however I do not need to exclude events if not specific fields

Labels (1)
0 Karma



I'd use SEDCMD in props.conf. You can find more details in the props.conf.spec. This is used for anonymization, but it should also work for your use case.

If you want detailed steps to set it up, you can follow this guide: Anonymize data with a sed script.


0 Karma
Get Updates on the Splunk Community!

Splunk Observability Cloud | Unified Identity - Now Available for Existing Splunk ...

Raise your hand if you’ve already forgotten your username or password when logging into an account. (We can’t ...

Index This | How many sides does a circle have?

February 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

Registration for Splunk University is Now Open!

Are you ready for an adventure in learning?   Brace yourselves because Splunk University is back, and it's ...