Splunk Search

Indexing data rather than the log file containing the data?

asamurphy
Engager

Is it possible to ship only specific statements from a log file, to be indexed on Splunk rather than indexing the entire log file?

For example, let's say I have a log file that contains some data about a failed process. If there was a 1 line statement in this log file that told me the time that process failed, would it be possible to index that line of data and not the entire log file? how would that be done?

Thank you in advance!

Labels (4)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @asamurphy,

yes, you can filter your events taking only the ones you need and discarding the others, the procedure is described at https://docs.splunk.com/Documentation/Splunk/8.2.6/Forwarding/Routeandfilterdatad#Filter_event_data_...

Ciao.

Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @asamurphy,

yes, you can filter your events taking only the ones you need and discarding the others, the procedure is described at https://docs.splunk.com/Documentation/Splunk/8.2.6/Forwarding/Routeandfilterdatad#Filter_event_data_...

Ciao.

Giuseppe

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @asamurphy,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...