Splunk Search

Indexing data rather than the log file containing the data?

asamurphy
Engager

Is it possible to ship only specific statements from a log file, to be indexed on Splunk rather than indexing the entire log file?

For example, let's say I have a log file that contains some data about a failed process. If there was a 1 line statement in this log file that told me the time that process failed, would it be possible to index that line of data and not the entire log file? how would that be done?

Thank you in advance!

Labels (4)
0 Karma
1 Solution

gcusello
Legend

Hi @asamurphy,

yes, you can filter your events taking only the ones you need and discarding the others, the procedure is described at https://docs.splunk.com/Documentation/Splunk/8.2.6/Forwarding/Routeandfilterdatad#Filter_event_data_...

Ciao.

Giuseppe

View solution in original post

0 Karma

gcusello
Legend

Hi @asamurphy,

yes, you can filter your events taking only the ones you need and discarding the others, the procedure is described at https://docs.splunk.com/Documentation/Splunk/8.2.6/Forwarding/Routeandfilterdatad#Filter_event_data_...

Ciao.

Giuseppe

0 Karma

gcusello
Legend

Hi @asamurphy,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma
Get Updates on the Splunk Community!

Improve Your Security Posture

Watch NowImprove Your Security PostureCustomers are at the center of everything we do at Splunk and security ...

Maximize the Value from Microsoft Defender with Splunk

 Watch NowJoin Splunk and Sens Consulting for this Security Edition Tech TalkWho should attend:  Security ...

This Week's Community Digest - Splunk Community Happenings [6.27.22]

Get the latest news and updates from the Splunk Community here! News From Splunk Answers ✍️ Splunk Answers is ...