Splunk Search

How to identify a raw events splunk instance origin

Lucas_K
Motivator

Does anyone know how to identify the splunk instance from which a raw event was forwarded?
Note: this could either be a heavy or a universal forwarder.

I might have expected to see a field that had this information but I can't see to find it.

I am looking to prove where specific already indexed messages came from.

The issue I have is that I believe a second forwarder instance was accidentally started on the same machine and it that forwarded the same events to the same index. We converted from a heavy to a universal but the heavy was restarted during an OS reboot (forgot to run the boot-start command i expect).

A "| dedup _raw" fixes it for future searches but I am just interested in how I could specifically identify the source. Ideally so I can filter these results with a |delete also 😉

Thanks.

Tags (3)
0 Karma
1 Solution

Lucas_K
Motivator

Well, it seems that you can't indentify the source splunk instance.

View solution in original post

0 Karma

Lucas_K
Motivator

Well, it seems that you can't indentify the source splunk instance.

0 Karma
Get Updates on the Splunk Community!

Index This | I am a number, but when you add ‘G’ to me, I go away. What number am I?

March 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

What’s New in Splunk App for PCI Compliance 5.3.1?

The Splunk App for PCI Compliance allows customers to extend the power of their existing Splunk solution with ...

Extending Observability Content to Splunk Cloud

Register to join us !   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to ...