<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Splunk AWS Blacklist on AccountID - Splunk Cloud in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-AWS-Blacklist-on-AccountID-Splunk-Cloud/m-p/582336#M102597</link>
    <description>&lt;P&gt;Hi, I am currently using the AWS Add-on for Splunk, and am looking to see if I can blacklist based on regex other than the applications UI for blacklisting based on eventnames. (using the blacklist method provided by the app:&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/AddOns/latest/AWS/CloudTrail" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/AddOns/latest/AWS/CloudTrail)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="inherit"&gt;I have a central Cloudtrail for all of my accounts and looking to send logs from a certain account to nullque so they are not ingested. The logs do have a field for AccountID. Reason being the specific logs from the account are about 80 percent of my ingestion and are not needed. I saw this article but as &lt;/FONT&gt;mentioned&lt;FONT face="inherit"&gt;&amp;nbsp;before I am not able to modify these files directly due to being on Splunk Cloud:&amp;nbsp;&lt;/FONT&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/6.4.1/Forwarding/Routeandfilterdatad#Discard_specific_events_and_keep_the_rest" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/Splunk/6.4.1/Forwarding/Routeandfilterdatad#Discard_specific_events_and_keep_the_rest&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since I do not have access to modify transform.conf or props.conf.&amp;nbsp; I was told I could modify the applications .conf files and send a zipped folder of the modified contents for Splunk team to upload and install.&lt;/P&gt;&lt;P&gt;Currently I do have blacklisting implemented on EventNames as this is part of the application.&amp;nbsp; Is there any guidance on how I can blacklist based on regex such as accountID=(id for account I want to send to nullque)?&lt;/P&gt;</description>
    <pubDate>Tue, 25 Jan 2022 00:00:59 GMT</pubDate>
    <dc:creator>SplunkJ1</dc:creator>
    <dc:date>2022-01-25T00:00:59Z</dc:date>
    <item>
      <title>Splunk AWS Blacklist on AccountID - Splunk Cloud</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-AWS-Blacklist-on-AccountID-Splunk-Cloud/m-p/582336#M102597</link>
      <description>&lt;P&gt;Hi, I am currently using the AWS Add-on for Splunk, and am looking to see if I can blacklist based on regex other than the applications UI for blacklisting based on eventnames. (using the blacklist method provided by the app:&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/AddOns/latest/AWS/CloudTrail" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/AddOns/latest/AWS/CloudTrail)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="inherit"&gt;I have a central Cloudtrail for all of my accounts and looking to send logs from a certain account to nullque so they are not ingested. The logs do have a field for AccountID. Reason being the specific logs from the account are about 80 percent of my ingestion and are not needed. I saw this article but as &lt;/FONT&gt;mentioned&lt;FONT face="inherit"&gt;&amp;nbsp;before I am not able to modify these files directly due to being on Splunk Cloud:&amp;nbsp;&lt;/FONT&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/6.4.1/Forwarding/Routeandfilterdatad#Discard_specific_events_and_keep_the_rest" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/Splunk/6.4.1/Forwarding/Routeandfilterdatad#Discard_specific_events_and_keep_the_rest&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since I do not have access to modify transform.conf or props.conf.&amp;nbsp; I was told I could modify the applications .conf files and send a zipped folder of the modified contents for Splunk team to upload and install.&lt;/P&gt;&lt;P&gt;Currently I do have blacklisting implemented on EventNames as this is part of the application.&amp;nbsp; Is there any guidance on how I can blacklist based on regex such as accountID=(id for account I want to send to nullque)?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 00:00:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-AWS-Blacklist-on-AccountID-Splunk-Cloud/m-p/582336#M102597</guid>
      <dc:creator>SplunkJ1</dc:creator>
      <dc:date>2022-01-25T00:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk AWS Blacklist on AccountID - Splunk Cloud</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-AWS-Blacklist-on-AccountID-Splunk-Cloud/m-p/582345#M102601</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/242449"&gt;@SplunkJ1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;May be you shall a create a private app having props , transforms conf having stanzas to send matching accountid events to nullQueue and deploy using this process to the instance where AWS add-on is running already.&lt;/P&gt;&lt;P&gt;You don't need to edit the same .conf files in the add-on , instead you can create a private app having your custom configs for sourcetype aws:cloudtrail. Splunk determines at the run-time and merge all of them together, After installation of private app (UI disabled) in on-prem splunk a restart of HF/Splunk instance is required. In SplunkCloud case you shall check how that works.&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&lt;A href="https://dev.splunk.com/enterprise/docs/releaseapps/manageprivatecloud/" target="_blank"&gt;https://dev.splunk.com/enterprise/docs/releaseapps/manageprivatecloud/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;An upvote would be appreciated if this reply helps!&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 02:32:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-AWS-Blacklist-on-AccountID-Splunk-Cloud/m-p/582345#M102601</guid>
      <dc:creator>venkatasri</dc:creator>
      <dc:date>2022-01-25T02:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk AWS Blacklist on AccountID - Splunk Cloud</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-AWS-Blacklist-on-AccountID-Splunk-Cloud/m-p/582421#M102618</link>
      <description>&lt;P&gt;Ok that is interesting. So if I upload a new app with only a transform, props conf with the exact same stanza (sourcetype) in the official app, it will add the rules for my private app's stanza to the main?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 17:02:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-AWS-Blacklist-on-AccountID-Splunk-Cloud/m-p/582421#M102618</guid>
      <dc:creator>SplunkJ1</dc:creator>
      <dc:date>2022-01-25T17:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk AWS Blacklist on AccountID - Splunk Cloud</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-AWS-Blacklist-on-AccountID-Splunk-Cloud/m-p/582725#M102665</link>
      <description>&lt;P&gt;Technically that works on on-prem unless the add-on is shared across multiple users in Splunk cloud.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 11:10:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-AWS-Blacklist-on-AccountID-Splunk-Cloud/m-p/582725#M102665</guid>
      <dc:creator>venkatasri</dc:creator>
      <dc:date>2022-01-27T11:10:54Z</dc:date>
    </item>
  </channel>
</rss>

