Splunk Search

How to search which forwarder in my environment is sending the most data?

AaronMoorcroft
Communicator

Morning Guys

Over the last week or so, my license usage has gone up by around 10 gig. I have looked in our Deployment Monitor App and when drilling down, I can't find which forwarder is sending the increased amounts of data, I have broken it down to what sourcetype it is, but what I really need is the host or hosts.

does anyone have a query that can provide this info ?

0 Karma
1 Solution

lguinn2
Legend

Try this

index=_internal source=*metrics.log group=tcpin_connections
| eval sourceHost=coalesce(sourceHost,hostname)
| stats sum(kb) AS kb_forwarded by sourceHost
| sort 3 -kb_forwarded

This will show you the three most active forwarders.

View solution in original post

glennpierce
Explorer

I like this search as it gives me source, sourcetype, host and volume in a nice table which can then be sorted by whichever column you want (defaults to volume):
index=_internal source=*license_usage.log | eval MB=b/1024/1024 | stats sum(MB) by s,st,h | rename s AS Source st AS Sourcetype h AS Host sum(MB) AS Volume(MB) | sort -Volume(MB) | head 50

0 Karma

lguinn2
Legend

Try this

index=_internal source=*metrics.log group=tcpin_connections
| eval sourceHost=coalesce(sourceHost,hostname)
| stats sum(kb) AS kb_forwarded by sourceHost
| sort 3 -kb_forwarded

This will show you the three most active forwarders.

AaronMoorcroft
Communicator

Thanks guys both are very helpful to me in different ways, I appreciate you time 🙂

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...