Splunk Search

Splunk aggregation

sabaKhadivi
Path Finder

due to the splunk couldn't aggregate logs I want to use arcsight smart connector, I think I should use splunk app for cef, is it correct? and what type of forwarder do I need to use?
if the volume of received logs are huge and we need to seprate logs on indexer without need to replicate, is it to possible to manage them with master node? and how can we define indexer qu antities?

Tags (1)
0 Karma

chrisyounger
SplunkTrust
SplunkTrust

Hi @sabaKhadivi

  1. Yes, use the Splunk app for CEF. It works well to do most of your extractions
  2. Universal forwarder is typically your best option
  3. If you want to disable replication for some indexes, you can do this in indexes.conf
  4. Typically you set indexer quantities using maxTotalDataSizeMB and frozenTimePeriodInSecs in indexes.conf

All the best 🙂

Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...