Getting Data In

Filtering out 90% log events from indexing

strive
Influencer

Hi,

We are using Splunk 6.1.1 in one of our products. In two of our other products where we use splunk 6.0 and 5.4, we have filtered log events from indexing using configurations in props.conf and transforms.conf. Here the percentage of log events sent to nullQueue is less (say 10%).

In the new product we are estimated to get 400 million log events per day and we are interested in only 40 million log events. We do not want to index remaining 360 million log events. Similar to our other products we are planning to filter these events by appropriate configurations in props.conf and transforms.conf. Is this the right approach to filter events? OR is there any better way to filter syslog events.

Thanks

Strive

Tags (2)
1 Solution

dshpritz
SplunkTrust
SplunkTrust

The best way to filter is to not ingest the items to start with. So, if you are feeding the syslog feed into a syslog receiver (such as syslog-ng or rsyslogd) you can use that to break the syslog feed into different files, then only ingest the files you are interested in. If you are not able to do that, then props and transforms are your best bet.

View solution in original post

dshpritz
SplunkTrust
SplunkTrust

The best way to filter is to not ingest the items to start with. So, if you are feeding the syslog feed into a syslog receiver (such as syslog-ng or rsyslogd) you can use that to break the syslog feed into different files, then only ingest the files you are interested in. If you are not able to do that, then props and transforms are your best bet.

strive
Influencer

Unfortunately we cannot break the syslog feed.

0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...