<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filtration of logs from Particular sourcetypes in Splunk Cloud Platform</title>
    <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/542836#M553</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I tried the props and transforms with sourcetype as "pan:firewall" in the Syslog HF server but it didnt worked. So now I have tried directly with the sourcetype as "pan:userid" with the following stanza but still the logs are getting ingested into Splunk.&lt;/P&gt;&lt;P&gt;I want to get it filtered out before ingestion itself so that we can save few licenses but unfortunately its not working.&lt;/P&gt;&lt;P&gt;This is my latest props and transforms which i used in the Syslog HF server for filtration.&lt;/P&gt;&lt;P&gt;props.conf:&lt;/P&gt;&lt;P&gt;[pan:userid]&lt;BR /&gt;TRANSFORMS-filter= setnull_case07&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;transforms.conf&lt;BR /&gt;[setnull_case07]&lt;BR /&gt;REGEX = ^[^,]+,[^,]+,[^,]+,USERID,&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;&lt;P&gt;So anyone kindly help on my request.&lt;/P&gt;</description>
    <pubDate>Mon, 08 Mar 2021 14:35:50 GMT</pubDate>
    <dc:creator>anandhalagaras1</dc:creator>
    <dc:date>2021-03-08T14:35:50Z</dc:date>
    <item>
      <title>Filtration of logs from Particular sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/541292#M524</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;We are ingesting Palo Alto Firewall logs into Splunk from our Syslog server. Hence we have made the Syslog server as a Heavy Forwarder as well.&lt;/P&gt;&lt;P&gt;And in the Syslog Heavy Forwarder server we have installed the "Splunk_TA_paloalto" Add-on and configured the inputs as "pan:firewall" so that based on the TA the data is getting segregated with different sourcetypes such as "pan:hipmatch" "pan:userid" , "pan:system" ,"pan:traffic" &amp;amp; "pan:threat".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So now we want to filter out the log ingestion from few of the sourcetypes such as "pan:hipmatch", "pan:userid" &amp;amp; "pan:system" alone. So how to filter those logs from Splunk before ingestion.&lt;/P&gt;&lt;P&gt;Where should i need to place the props and transforms and what would be the props and transforms to filter those logs from those particular sourcetypes?&lt;/P&gt;&lt;P&gt;Hence kindly help on my request.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2021 03:02:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/541292#M524</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-02-25T03:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: Filtration of logs from Particular sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/541299#M525</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You should place below props snd transforms configs to the heavy forwarder.&amp;nbsp; You can play with the regex to filter other events too.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;props.conf
[pan:firewall]
TRANSFORMS-filter = setnull

transforms.conf
[setnull]
REGEX = ^[^,]+,[^,]+,[^,]+,HIPMATCH|SYSTEM|USERID,
DEST_KEY = queue
FORMAT = nullQueue&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2021 04:30:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/541299#M525</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2021-02-25T04:30:33Z</dc:date>
    </item>
    <item>
      <title>Re: Filtration of logs from Particular sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/541308#M526</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your prompt response. But we have configured the pan:firewall sourcetype for two indexes.&lt;/P&gt;&lt;P&gt;Index= abc &amp;amp; def&lt;/P&gt;&lt;P&gt;So i want to filter out the logs only from index=abc; sourcetype=pan:firewall&amp;nbsp; so after segregation of sourcetype in that i want to filter the HIPMATCH, SYSTEM and USERID.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So kindly help on the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2021 06:14:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/541308#M526</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-02-25T06:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: Filtration of logs from Particular sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/541315#M528</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If you are ingesting logs to two different indexes, you should be using to inputs. You can use the same config that I proposed only by changing the props stanza with source.&lt;/P&gt;&lt;P&gt;As a sample; assuming you are getting pan log via syslog server using file monitor /log/syslog/pan;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;props.conf
[source::/log/syslog/pan]
TRANSFORMS-filter = setnull

transforms.conf
[setnull]
REGEX = ^[^,]+,[^,]+,[^,]+,HIPMATCH|SYSTEM|USERID,
DEST_KEY = queue
FORMAT = nullQueue&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2021 08:13:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/541315#M528</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2021-02-25T08:13:40Z</dc:date>
    </item>
    <item>
      <title>Re: Filtration of logs from Particular sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/542080#M548</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;As you mentioned I have used to filter out the logs based on sourcetype "pan:firewall" and placed it in our heavy forwarder server but still i can see the logs are getting ingested into splunk from pan:userid, pan:hipmatch &amp;amp; pan:system. Is it anything related to case sensitive?&lt;/P&gt;&lt;P&gt;As per the Add-On "Splunk_TA_paloalto" it is mentioned as below in the props.conf:&lt;/P&gt;&lt;P&gt;[pan:firewall]&lt;BR /&gt;category = Network &amp;amp; Security&lt;BR /&gt;description = Syslog from Palo Alto Networks Next-generation Firewall&lt;BR /&gt;pulldown_type = true&lt;BR /&gt;SHOULD_LINEMERGE = false&lt;BR /&gt;TIME_PREFIX = ^(?:[^,]*,){6}&lt;BR /&gt;MAX_TIMESTAMP_LOOKAHEAD = 32&lt;BR /&gt;TRANSFORMS-sourcetype = pan_threat, pan_traffic, pan_system, pan_config, pan_hipmatch, pan_correlation, pan_userid, pan_traps4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So kindly help me out to filter those logs from Splunk.&lt;/P&gt;&lt;PRE&gt;props.conf
[pan:firewall]
TRANSFORMS-filter = setnull

transforms.conf
[setnull]
REGEX = ^[^,]+,[^,]+,[^,]+,HIPMATCH|SYSTEM|USERID,
DEST_KEY = queue
FORMAT = nullQueue&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Mar 2021 06:44:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/542080#M548</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-03-03T06:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Filtration of logs from Particular sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/542130#M549</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;So when checked from my end,I can see that the source has been already configured with a props.conf i.e. the Timezone (TZ). So hence I have removed the props which i created with the sourcetype and added the stanza as provided in the source props which already exists and created the transforms.conf as mentioned.&lt;/P&gt;&lt;P&gt;props.conf:&lt;BR /&gt;[source::/var/log/remote/0000-Today/logfile/hostname]&lt;BR /&gt;TZ = CST6CDT&lt;BR /&gt;TRANSFORMS-filter = setnull220&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;transforms.conf:&lt;BR /&gt;[setnull220]&lt;BR /&gt;REGEX = ^[^,]+,[^,]+,[^,]+,HIPMATCH|SYSTEM|USERID,&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;But still i can see the logs are getting ingested into Splunk with the following sourcetype pan:userid, pan:system and pan:hipmatch.&lt;/P&gt;&lt;P&gt;The extracted field names for HIPMATCH, SYSTEM and USERID comes under "type".&lt;/P&gt;&lt;P&gt;So kindly let me know where is the exact error &amp;amp; how can i stop ingesting those logs before ingestion into Splunk.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Mar 2021 10:26:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/542130#M549</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-03-03T10:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: Filtration of logs from Particular sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/542131#M550</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Also I have tried the regex like mentioned below as well but still the logs are getting ingested into Splunk.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;props.conf:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[source::/var/log/remote/0000-Today/logfile/hostname]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;TZ = CST6CDT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;TRANSFORMS-filter = setnull220&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;transforms.conf:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[setnull220]&lt;/SPAN&gt;&lt;BR /&gt;REGEX = (?=USERID|SYSTEM|HIPMATCH) OR&amp;nbsp;REGEX = (USERID|SYSTEM|HIPMATCH)&lt;BR /&gt;&lt;SPAN&gt;DEST_KEY = queue&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;FORMAT = nullQueue&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But still the data is not getting filtered out before ingestion. So kindly help me on the same.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Mar 2021 10:29:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/542131#M550</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-03-03T10:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: Filtration of logs from Particular sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/542836#M553</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I tried the props and transforms with sourcetype as "pan:firewall" in the Syslog HF server but it didnt worked. So now I have tried directly with the sourcetype as "pan:userid" with the following stanza but still the logs are getting ingested into Splunk.&lt;/P&gt;&lt;P&gt;I want to get it filtered out before ingestion itself so that we can save few licenses but unfortunately its not working.&lt;/P&gt;&lt;P&gt;This is my latest props and transforms which i used in the Syslog HF server for filtration.&lt;/P&gt;&lt;P&gt;props.conf:&lt;/P&gt;&lt;P&gt;[pan:userid]&lt;BR /&gt;TRANSFORMS-filter= setnull_case07&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;transforms.conf&lt;BR /&gt;[setnull_case07]&lt;BR /&gt;REGEX = ^[^,]+,[^,]+,[^,]+,USERID,&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;&lt;P&gt;So anyone kindly help on my request.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Mar 2021 14:35:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/542836#M553</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-03-08T14:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: Filtration of logs from Particular sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/542988#M556</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your help. And now i have resolved the issue from my end post which the logs are not getting ingested into Splunk for these sourcetypes.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Mar 2021 09:41:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Filtration-of-logs-from-Particular-sourcetypes/m-p/542988#M556</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-03-09T09:41:41Z</dc:date>
    </item>
  </channel>
</rss>

