Getting Data In

Forwarder-side filter not working

dantonag
Explorer

Hello,
we've set up a transforms.conf filter in one of our forwarders (to lower indexed volume per day), but the configuration is not working (events are not filtered out).

Log lines (events) we want to exclude look like this:

26/06/2012 18:24:31 | ReadLstOfValTable | INFO | Numero di record estratti [1]

We have configured transforms.conf and props.conf like this:

  • props.conf

[SiebelDataADP]

TRANSFORMS-null= SiebelDataADPFiltro1

  • transforms.conf

[SiebelDataADPFiltro1]

REGEX = .*Numero\sdi\srecord\sestratti\s.*

DEST_KEY = queue

FORMAT = nullQueue

Any hints?

Thanks

Gabriele

Tags (2)
0 Karma

Ayn
Legend

This kind of filtering cannot be done on light forwarders (Universal Forwarder or its older counterpart, the Lightweight Forwarder). props.conf settings on light forwarders are largely ignored because the features they relate to (such as segmenting data that is read into individual events) don't exist there. This kind of filtering can only be performed on an indexer or a heavy forwarder.

Ayn
Legend

Yes, that's correct.

dantonag
Explorer

Thanks.

So we have either to:

  • Configure filtering server-side ($SPLUNK_HOME/etc/system/local/props.conf and transforms.conf)

  • Use an "heavy" forwarder (i.e. Splunk itself)

Is this right?

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...