Splunk Search

Indexing data rather than the log file containing the data?

asamurphy
Engager

Is it possible to ship only specific statements from a log file, to be indexed on Splunk rather than indexing the entire log file?

For example, let's say I have a log file that contains some data about a failed process. If there was a 1 line statement in this log file that told me the time that process failed, would it be possible to index that line of data and not the entire log file? how would that be done?

Thank you in advance!

Labels (4)
0 Karma
1 Solution

gcusello
Legend

Hi @asamurphy,

yes, you can filter your events taking only the ones you need and discarding the others, the procedure is described at https://docs.splunk.com/Documentation/Splunk/8.2.6/Forwarding/Routeandfilterdatad#Filter_event_data_...

Ciao.

Giuseppe

View solution in original post

0 Karma

gcusello
Legend

Hi @asamurphy,

yes, you can filter your events taking only the ones you need and discarding the others, the procedure is described at https://docs.splunk.com/Documentation/Splunk/8.2.6/Forwarding/Routeandfilterdatad#Filter_event_data_...

Ciao.

Giuseppe

0 Karma

gcusello
Legend

Hi @asamurphy,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma
Get Updates on the Splunk Community!

Security Highlights: September 2022 Newsletter

 September 2022 The Splunk App for Fraud Analytics (SFA) is now Splunk SupportedUse your existing Splunk ...

Platform Highlights | September 2022 Newsletter

 September 2022 What’s New in 9.0 and How to UpgradeGet a walk through of what is new Splunk Enterprise 9.0 ...

Observability Highlights | September 2022 Newsletter

 September 2022 Splunk Observability SuiteAccess to "Classic" SignalFx Interface Will be Removed on Sept 30, ...