<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need help not indexing some specific events that match a field in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606195#M105342</link>
    <description>&lt;P&gt;As I mentioned earlier, NEVER MODIFY A FILE IN A &lt;FONT face="courier new, courier"&gt;default&amp;nbsp;&lt;/FONT&gt;DIRECTORY.&lt;/P&gt;&lt;P&gt;If the file does not exist in &lt;FONT face="courier new,courier"&gt;local&lt;/FONT&gt; then create it.&lt;/P&gt;</description>
    <pubDate>Tue, 19 Jul 2022 14:52:49 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2022-07-19T14:52:49Z</dc:date>
    <item>
      <title>How to not index some specific events that match a field?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606174#M105334</link>
      <description>&lt;P&gt;Because of licensing reasons, I want to stop indexing these events (as they make up almost 50% of the index)&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;index=cisco dest_port=53&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;So basically DNS requests. Is it possible for this specific &lt;STRONG&gt;index=cisco&lt;/STRONG&gt; to stop indexing these logs where &lt;STRONG&gt;dest_port=53&lt;/STRONG&gt;? I cant do it from the cisco firewall itself.&lt;/P&gt;
&lt;P&gt;I googled a bit and the consensus seems to be sending the logs to NULLQUEUE, and modify props.conf &amp;amp; transform.conf. But what I'm struggling with is where are these files?&lt;/P&gt;
&lt;P&gt;My Splunk architecture is 2 Search Heads in a cluster and 1 License Manager server. Where to modify these files? On both Search heads?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2022 16:14:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606174#M105334</guid>
      <dc:creator>dritjon</dc:creator>
      <dc:date>2022-07-19T16:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: Need help not indexing some specific events that match a field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606185#M105336</link>
      <description>&lt;P&gt;There can be many props.conf and transforms.conf files in a Splunk instance.&amp;nbsp; You'll find them in &lt;FONT face="courier new,courier"&gt;$SPLUNK_HOME/etc/system/default&lt;/FONT&gt;, &lt;FONT face="courier new,courier"&gt;$SPLUNK_HOME/etc/system/local&lt;/FONT&gt;, &lt;FONT face="courier new,courier"&gt;$SPLUNK_HOME/etc/apps/&amp;lt;appname&amp;gt;/default&lt;/FONT&gt;, and &lt;FONT face="courier new,courier"&gt;$SPLUNK_HOME/etc/apps/&amp;lt;appname&amp;gt;/local&lt;/FONT&gt; (ignoring user-specific files).&amp;nbsp; Splunk combines them all, using precedence rules, to produce a run-time configuration.&lt;/P&gt;&lt;P&gt;Never modify a .conf file in a &lt;FONT face="courier new,courier"&gt;default&lt;/FONT&gt; directory.&amp;nbsp; Any such changes will be lost the next time Splunk or the app is upgraded.&lt;/P&gt;&lt;P&gt;Where do you make your changes?&amp;nbsp; In the app that defines the sourcetype being modified.&amp;nbsp; That may be a Cisco add-on or a custom app.&lt;/P&gt;&lt;P&gt;Your architecture seems unusual.&amp;nbsp; A search head cluster is supposed to have at least 3 search heads and you don't mention indexers at all. The settings to send unwanted events to the null queue must be installed on each indexer.&amp;nbsp; If you don't have separate indexers then the settings go on the SHs.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2022 13:59:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606185#M105336</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-07-19T13:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: Need help not indexing some specific events that match a field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606186#M105337</link>
      <description>&lt;P&gt;The data routing props/transforms are setup on node where data is parsed and usually it's the indexers where that happens. If you're using Heavy forwarder (a node with Splunk Enterprise on it and does the data collection), then the data parsing happens on heavy forwarder.&lt;/P&gt;&lt;P&gt;Also, the null routing happens based on sourcetype/source/host and not index. So identify which sourcetypes/source/host are sending events with dest=53, write a regex which will run on _raw (raw data) and setup appropriate configurations for filtering out the data before indexing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/8.2.2203/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues" target="_blank"&gt;https://docs.splunk.com/Documentation/SplunkCloud/8.2.2203/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2022 14:03:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606186#M105337</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2022-07-19T14:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: Need help not indexing some specific events that match a field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606188#M105338</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;There can be many props.conf and transforms.conf files in a Splunk instance.&amp;nbsp; You'll find them in &lt;FONT face="courier new,courier"&gt;$SPLUNK_HOME/etc/system/default&lt;/FONT&gt;, &lt;FONT face="courier new,courier"&gt;$SPLUNK_HOME/etc/system/local&lt;/FONT&gt;, &lt;FONT face="courier new,courier"&gt;$SPLUNK_HOME/etc/apps/&amp;lt;appname&amp;gt;/default&lt;/FONT&gt;, and &lt;FONT face="courier new,courier"&gt;$SPLUNK_HOME/etc/apps/&amp;lt;appname&amp;gt;/local&lt;/FONT&gt; (ignoring user-specific files).&amp;nbsp; Splunk combines them all, using precedence rules, to produce a run-time configuration.&lt;/P&gt;&lt;P&gt;Never modify a .conf file in a &lt;FONT face="courier new,courier"&gt;default&lt;/FONT&gt; directory.&amp;nbsp; Any such changes will be lost the next time Splunk or the app is upgraded.&lt;/P&gt;&lt;P&gt;Where do you make your changes?&amp;nbsp; In the app that defines the sourcetype being modified.&amp;nbsp; That may be a Cisco add-on or a custom app.&lt;/P&gt;&lt;P&gt;Your architecture seems unusual.&amp;nbsp; A search head cluster is supposed to have at least 3 search heads and you don't mention indexers at all. The settings to send unwanted events to the null queue must be installed on each indexer.&amp;nbsp; If you don't have separate indexers then the settings go on the SHs.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Sorry as I'm new to splunk. I have 1 search head and 2 indexers. Do I need to change the files on the search head or indexer? My /opt path on both machines has these folders splunkforwarder, splunk_indexer, syslog&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2022 14:18:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606188#M105338</guid>
      <dc:creator>dritjon</dc:creator>
      <dc:date>2022-07-19T14:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: Need help not indexing some specific events that match a field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606190#M105339</link>
      <description>&lt;P data-unlink="true"&gt;The &lt;STRONG&gt;source&lt;/STRONG&gt; is&amp;nbsp;/opt/syslog/10.101.132.1/&amp;nbsp;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;sourcetype&lt;/STRONG&gt; is cisco:asa&lt;/P&gt;&lt;P&gt;My architecture has 2 indexers in a cluster.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do i have to edit the files on both indexers&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2022 14:12:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606190#M105339</guid>
      <dc:creator>dritjon</dc:creator>
      <dc:date>2022-07-19T14:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Need help not indexing some specific events that match a field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606191#M105340</link>
      <description>&lt;P&gt;Yes, since both indexers can index data and parse it, it should be on both.&lt;/P&gt;&lt;P&gt;Since they're clustered, you could create an app containing those configuration and deploy it from Cluster Manager/master.&amp;nbsp; See this:&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.0.0/Indexer/Updatepeerconfigurations" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.0.0/Indexer/Updatepeerconfigurations&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2022 14:15:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606191#M105340</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2022-07-19T14:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: Need help not indexing some specific events that match a field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606194#M105341</link>
      <description>&lt;P&gt;Thanks. One last question.&lt;/P&gt;&lt;P&gt;The official doc says to modify the file in this path&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;$SPLUNK_HOME/etc/system/local/props.conf&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;But my &lt;STRONG&gt;local&lt;/STRONG&gt; path doesnt have a props.conf file. Instead the path&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;$SPLUNK_HOME/etc/system/default/&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;has a props.conf file&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Which to update?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2022 14:31:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606194#M105341</guid>
      <dc:creator>dritjon</dc:creator>
      <dc:date>2022-07-19T14:31:16Z</dc:date>
    </item>
    <item>
      <title>Re: Need help not indexing some specific events that match a field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606195#M105342</link>
      <description>&lt;P&gt;As I mentioned earlier, NEVER MODIFY A FILE IN A &lt;FONT face="courier new, courier"&gt;default&amp;nbsp;&lt;/FONT&gt;DIRECTORY.&lt;/P&gt;&lt;P&gt;If the file does not exist in &lt;FONT face="courier new,courier"&gt;local&lt;/FONT&gt; then create it.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2022 14:52:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606195#M105342</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-07-19T14:52:49Z</dc:date>
    </item>
    <item>
      <title>Re: Need help not indexing some specific events that match a field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606197#M105343</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/15147"&gt;@somesoni2&lt;/a&gt;&amp;nbsp;and I said, the changes should be done on the indexer(s).&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2022 14:58:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606197#M105343</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-07-19T14:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: Need help not indexing some specific events that match a field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606209#M105344</link>
      <description>&lt;P&gt;I would say create a new app on Cluster Manager/Master ($SPLUNK_HOME/etc/master-apps/), say cisco_routing_props_transforms and create file "cisco_routing_props_transforms/local/props.conf" and "cisco_routing_props_transforms/local/transforms.conf". After that deploy the app to both indexer cluster peer. That way both indexers will always have same config.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2022 16:10:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-not-index-some-specific-events-that-match-a-field/m-p/606209#M105344</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2022-07-19T16:10:49Z</dc:date>
    </item>
  </channel>
</rss>

