<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filtering Events using nullqueue in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/574779#M101582</link>
    <description>&lt;P&gt;This thread is more than 3 years old.&amp;nbsp; To help ensure more people see it and offer solutions, you should post a new question.&lt;/P&gt;</description>
    <pubDate>Fri, 12 Nov 2021 18:14:35 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2021-11-12T18:14:35Z</dc:date>
    <item>
      <title>Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310804#M58397</link>
      <description>&lt;P&gt;Real novice here. I am ingesting a sourcetype into Splunk, and want to filter out any events with the word "FAILED" right after the first IP address.`&lt;/P&gt;

&lt;P&gt;Below is my props in etc\apps\search\local&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; [sslbcoat1]
 DATETIME_CONFIG = 
 NO_BINARY_CHECK = true
 category = Custom
 pulldown_type = true
 TRANSFORMS-null = setnull
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;`&lt;BR /&gt;
and then here's my transforms where I THOUGHT I was carving out failures and sending them to null:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; [setnull]
 REGEX = ^.+(F...).+$
 DEST_KEY = queue
 FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The regex might be wrong, but somehow I don't think that's the big problem. Thanks and any insight would be appreciated.  Also every time I try to save props.conf it says I do not have permission to save even though I'm a full admin, I have to fully unlock the directory to save, is there a way to avoid that?  Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 19:27:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310804#M58397</guid>
      <dc:creator>JPrictoe</dc:creator>
      <dc:date>2018-02-23T19:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310805#M58398</link>
      <description>&lt;P&gt;If you don't have the right regex then the filter can't possibly work.&lt;BR /&gt;
Please show some sample events, both those to be filtered and those to be kept.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 19:45:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310805#M58398</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2018-02-23T19:45:01Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310806#M58399</link>
      <description>&lt;P&gt;2014-04-17 13:49:32 2910 XX.XX.XX.XXX TUNNELED - none - - XX.XX.XXX.XXX - XX.XX.XXX.XXX TLSv1 RC4-SHA 128 *.roadtrippers.com "none" TLSv1 RC4-SHA 128 - XXX.XXX.XXX.XXX SG-SSL-Proxy-Service XX.XX.XXX.XXX  584912014-04-17 13:50:04 1 XX.XX.X.XX FAILED - - - -XXX.XXX.XX.XXX - - - none - - - - none - - XXX.XXX.XXX.XXX SG-SSL-Proxy-Service - 57498&lt;/P&gt;

&lt;P&gt;Two events mashed together.  Splunk separates them by timestamp when I index automatically, but I need to separate all the events with "FAILED" in them, and send them to null.  I feel like I am missing something obvious.  I am indexing these by uploading a txt file with the sample logs in them.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 20:14:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310806#M58399</guid>
      <dc:creator>JPrictoe</dc:creator>
      <dc:date>2018-02-23T20:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310807#M58400</link>
      <description>&lt;P&gt;Your regex is defantly the culprit here&lt;/P&gt;

&lt;P&gt;Try this and it should work&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setnull]
  REGEX = \d+\.\d+\.\d+\.\d+\sFAILED
  DEST_KEY = queue
  FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 23 Feb 2018 20:58:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310807#M58400</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2018-02-23T20:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310808#M58401</link>
      <description>&lt;P&gt;So are you saying that the events are mashed together in a single event?&lt;/P&gt;

&lt;P&gt;If so, thats because you didn't apply base configs to your props.conf&lt;/P&gt;

&lt;P&gt;Step 1: Add this to your props on the indexer and restart splunkd&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[&amp;lt;YOUR SOURCETYPE&amp;gt;]
TIME_PREFIX = ^
TIME_FORMAT = %Y-%m-%d %H:%M:%S
SHOULD_LINEMERGE = false
LINE_BREAKER = ([\r\n]+)\d+-\d+-\d+\s\d+:\d+:\d+\s
MAX_TIMESTAMP_LOOKAHEAD = 25
TRUNCATE = 10000
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Step 2: Apply the regex I gave you below&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 21:04:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310808#M58401</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2018-02-23T21:04:46Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310809#M58402</link>
      <description>&lt;P&gt;The simplest regex for that is &lt;CODE&gt;(FAILED)&lt;/CODE&gt;, but that will match the word anywhere in the event.  To find only "FAILED" after an IP address, try &lt;CODE&gt;(\d+\.\d+\.\d+\.\d+\sFAILED)&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;Have you added &lt;CODE&gt;MAX_DAYS_SINCE&lt;/CODE&gt; to your props.conf file to account for the 2014 dates you're uploading?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 21:05:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310809#M58402</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2018-02-23T21:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310810#M58403</link>
      <description>&lt;P&gt;So that regex pulls out the   "FAILED" but I think the regex needs to specify the entire event that must be sent to null? &lt;CODE&gt;\d{4}\W\d{2}\W\d{2}\s\d{2}\W\d{2}\W\d{2}.+(FAIL..).+&lt;/CODE&gt; does just that (even though it's hideous), but I tried both and still returns me the failed events in search.  I should only need to do a TRANSFORMS-null in props.conf under my [sslbcoat1] stanza, and then put a corresponding stanza in transforms.conf right?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 21:14:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310810#M58403</guid>
      <dc:creator>JPrictoe</dc:creator>
      <dc:date>2018-02-23T21:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310811#M58404</link>
      <description>&lt;P&gt;Apologies didn't see this response, I have some sample data in a .txt with 93 timestamped events in it.  I have the sourcetype defined as above as well as a corresponding transform for setnull.  I go to "Add Data" and upload my "ssl_bcoat_2.txt", save it as an sslbcoat1 sourcetype, then create a text index to index it to.  Just to be sure, I should be editing props and transforms in the apps\local and not system\local correct?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 18:11:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310811#M58404</guid>
      <dc:creator>JPrictoe</dc:creator>
      <dc:date>2020-09-29T18:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310812#M58405</link>
      <description>&lt;P&gt;No, you just telling splunk to identify a pattern within an event. If that pattern matches the regex, it will then throw that event out. You need to first apply the base configs I provided you in the comments to split your event correctly, then apply the nullqueue stanza I gave you which will throw away your failed events&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 21:33:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310812#M58405</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2018-02-23T21:33:31Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310813#M58406</link>
      <description>&lt;P&gt;Understood on the regex, the events already break correctly automatically using the Splunk's auto setting (I get 93 events which is what I have before null) do I still need to add those base configs to the sourcetype stanza in props?  do I need to be adding the TRANSFORM-null under a source stanza rather than a sourcetype stanza?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 21:52:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310813#M58406</guid>
      <dc:creator>JPrictoe</dc:creator>
      <dc:date>2018-02-23T21:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310814#M58407</link>
      <description>&lt;P&gt;Correct.  $SPLUNK_HOME\etc\apps\local, to be more specific.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 22:00:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310814#M58407</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2018-02-23T22:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310815#M58408</link>
      <description>&lt;P&gt;Adding the base configs @skoelpin provided is a Best Practice.  Specifying them means Splunk doesn't have to guess about the right time format, etc. so it speeds things up a little.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 22:02:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/310815#M58408</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2018-02-23T22:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/574739#M101580</link>
      <description>&lt;P&gt;Hi&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/132691"&gt;@skoelpin&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a little different scenario but facing a similar issue. Seeking your help.&lt;BR /&gt;We are integrating the json logs via HEC into Splunk Heavy Forwarder.&lt;BR /&gt;I have tried the below configurations.I am applying the props for the source. In transforms, there are different regexes and I would want to route it to different indexes based on log files and route all the other files not required to a null queue. I would not be able to use FORMAT=indexqueue in transforms.conf as I cannot mention multiple indexes in inputs.conf .This is not working and I am not getting results as expected. Kindly help.&lt;/P&gt;&lt;P&gt;The configs are like below:&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;PROPS.CONF --&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;[source::*model-app*]&lt;BR /&gt;TRANSFORMS-segment=setnull,security_logs,application_logs,provisioning_logs&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;TRANSFORMS.CONF --&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[setnull]&lt;BR /&gt;REGEX=class\"\:\"(.*?)\"&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;&lt;P&gt;[security_logs]&lt;BR /&gt;REGEX=(class\"\:\"(/var/log/cron|/var/log/audit/audit.log|/var/log/messages|/var/log/secure)\")&lt;BR /&gt;DEST_KEY=_MetaData:Index&lt;BR /&gt;FORMAT=model_sec&lt;BR /&gt;WRITE_META=true&lt;BR /&gt;LOOKAHEAD=40000&lt;/P&gt;&lt;P&gt;[application_logs]&lt;BR /&gt;REGEX=(class\"\:\"(/var/log/application.log|/var/log/local*?.log)\")&lt;BR /&gt;DEST_KEY=_MetaData:Index&lt;BR /&gt;FORMAT=model_app&lt;BR /&gt;WRITE_META=true&lt;BR /&gt;LOOKAHEAD=40000&lt;/P&gt;&lt;P&gt;[provisioning_logs]&lt;BR /&gt;REGEX=class\"\:\"(/opt/provgw-error_msg.log|/opt/provgw-bulkrequest.log|/opt/provgw/provgw-spml_command.log.*?)\"&lt;BR /&gt;DEST_KEY=_MetaData:Index&lt;BR /&gt;FORMAT=model_prov&lt;BR /&gt;WRITE_META=true&lt;/P&gt;</description>
      <pubDate>Fri, 12 Nov 2021 13:22:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/574739#M101580</guid>
      <dc:creator>bhargavi</dc:creator>
      <dc:date>2021-11-12T13:22:38Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Events using nullqueue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/574779#M101582</link>
      <description>&lt;P&gt;This thread is more than 3 years old.&amp;nbsp; To help ensure more people see it and offer solutions, you should post a new question.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Nov 2021 18:14:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Events-using-nullqueue/m-p/574779#M101582</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-11-12T18:14:35Z</dc:date>
    </item>
  </channel>
</rss>

