Splunk Search

Indexing data rather than the log file containing the data?

asamurphy
Engager

Is it possible to ship only specific statements from a log file, to be indexed on Splunk rather than indexing the entire log file?

For example, let's say I have a log file that contains some data about a failed process. If there was a 1 line statement in this log file that told me the time that process failed, would it be possible to index that line of data and not the entire log file? how would that be done?

Thank you in advance!

Labels (4)
0 Karma
1 Solution

gcusello
Legend

Hi @asamurphy,

yes, you can filter your events taking only the ones you need and discarding the others, the procedure is described at https://docs.splunk.com/Documentation/Splunk/8.2.6/Forwarding/Routeandfilterdatad#Filter_event_data_...

Ciao.

Giuseppe

View solution in original post

0 Karma

gcusello
Legend

Hi @asamurphy,

yes, you can filter your events taking only the ones you need and discarding the others, the procedure is described at https://docs.splunk.com/Documentation/Splunk/8.2.6/Forwarding/Routeandfilterdatad#Filter_event_data_...

Ciao.

Giuseppe

0 Karma

gcusello
Legend

Hi @asamurphy,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma
Get Updates on the Splunk Community!

Splunk Forwarders and Forced Time Based Load Balancing

Splunk customers use universal forwarders to collect and send data to Splunk. A universal forwarder can send ...

NEW! Log Views in Splunk Observability Dashboards Gives Context From a Single Page

Today, Splunk Observability releases log views, a new feature for users to add their logs data from Splunk Log ...

Last Chance to Submit Your Paper For BSides Splunk - Deadline is August 12th!

Hello everyone! Don't wait to submit - The deadline is August 12th! We have truly missed the community so ...