Discover, share, and install apps and add-ons with the Splunk community on Splunkbase. Publish your own or add others to your Splunk platform instance.
Streamline your security operations with a SOAR system that integrates orchestration, playbook automation, and case management to enhance threat response.
Access and share apps and add-ons with the Splunk community on Splunkbase. Publish your own apps, or download and install others on your Splunk platform instance.
Exclude historical data processing from ingest actions rulesets
Configure ingest actions rulesets to separate historical data processing from stream data processing for the same source type.
Ensure you have administrative access to the ingest actions rulesets configuration.
For a given source type, you can configure specific rules to separate historical data processing from stream data processing. This configuration routes historical data to a dedicated index and excludes it from further processing by rulesets designed for stream data.
Note: Each source type can only have one associated ruleset.
In the sourcetype column, find rulesets that process historical data.
Alternatively, use the search box on the right to filter for relevant rulesets. For example, you can filter by a sourcetype.
For the ruleset that you want to update, in the Actions column, select Edit.
Exclude historical data in a ruleset.
You will add two rules to your ruleset to handle historical data:
Configure data routing for historical data.
Drop historical data from further processing within this ruleset.
For example, you want to exclude historical data in a ruleset for the test123 sourcetype. Let's assume the following conditions:
This ruleset replaces the staging to mask, and then sets the index to stream.
You want to send historical data to the promote index, and continue the ingest action processing for stream data.
Add the following rules at the beginning of your ruleset, before any existing processing rules:
To configure the data routing rule, go to the Route to Destination section and set the following values:
In the Condition section, select Eval.
In the Eval Expression field, enter isnotnull(splunk_promote_id).
Note:
The promote data uses a different index than the stream data, so you don't have to set an index.
This rule keeps promote data within the ingest actions processing pipeline. The next rule will remove it from further processing.
To confirm changes, select Apply.
To configure the data dropping rule, go to the Filter using Eval section and in the Drop Events Matching Eval Expression field, enter isnotnull(splunk_promote_id).
To confirm changes, select Apply.
(Optional) Test your ruleset by sending both stream and historical data using HEC (HTTP Event Collector).