Getting Data In

Forwarder-side filter not working

dantonag
Explorer

Hello,
we've set up a transforms.conf filter in one of our forwarders (to lower indexed volume per day), but the configuration is not working (events are not filtered out).

Log lines (events) we want to exclude look like this:

26/06/2012 18:24:31 | ReadLstOfValTable | INFO | Numero di record estratti [1]

We have configured transforms.conf and props.conf like this:

  • props.conf

[SiebelDataADP]

TRANSFORMS-null= SiebelDataADPFiltro1

  • transforms.conf

[SiebelDataADPFiltro1]

REGEX = .*Numero\sdi\srecord\sestratti\s.*

DEST_KEY = queue

FORMAT = nullQueue

Any hints?

Thanks

Gabriele

Tags (2)
0 Karma

Ayn
Legend

This kind of filtering cannot be done on light forwarders (Universal Forwarder or its older counterpart, the Lightweight Forwarder). props.conf settings on light forwarders are largely ignored because the features they relate to (such as segmenting data that is read into individual events) don't exist there. This kind of filtering can only be performed on an indexer or a heavy forwarder.

Ayn
Legend

Yes, that's correct.

dantonag
Explorer

Thanks.

So we have either to:

  • Configure filtering server-side ($SPLUNK_HOME/etc/system/local/props.conf and transforms.conf)

  • Use an "heavy" forwarder (i.e. Splunk itself)

Is this right?

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...