How to exclude some events from being indexed by splunk?
Answer Posted / Zenia Malhotra
To exclude some events from being indexed by Splunk, you can use the drop_rm event command in a custom input configuration file or an input search. This command tells Splunk not to index specific events that match certain criteria. For example, you could drop events containing sensitive information or duplicate data.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers