<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to get linux logs to blacklist in input.conf? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/625312#M107474</link>
    <description>&lt;P&gt;Hi , Can i push prop.conf and transfrom.conf via deployment server to Universal Forwarder (installed on 600 Linux server)&lt;/P&gt;&lt;P&gt;i am thinking to create these prop and transfroms file on deployment server under /opt/splunk/etc/deployment-apps/&amp;lt;App Name&amp;gt;/local.&lt;/P&gt;&lt;P&gt;will it work&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;shashi&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Dec 2022 09:13:30 GMT</pubDate>
    <dc:creator>shashilendra</dc:creator>
    <dc:date>2022-12-27T09:13:30Z</dc:date>
    <item>
      <title>How to get linux logs to blacklist in input.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/623604#M107287</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;getting huges audit logs and wanted to blacklist in input.conf&amp;nbsp; .&lt;/P&gt;
&lt;P&gt;index=*linux* source="/var/log/audit/audit.log" type=proctitle&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 16:13:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/623604#M107287</guid>
      <dc:creator>shashilendra</dc:creator>
      <dc:date>2022-12-07T16:13:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to get linux logs to blacklist in input.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/623616#M107292</link>
      <description>&lt;P class="lia-align-left"&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/229470"&gt;@shashilendra&lt;/a&gt;&amp;nbsp;- I don't think what you are trying to do is possible at the input level with any built-in Splunk configuration.&lt;/P&gt;&lt;P&gt;You can do it by Null Queue (with props/transforms configuration) at the parsing stage.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;props.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[source::/var/log/audit/audit.log]
TRANSFORMS-filter_some_logs&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;transforms.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[filter_some_logs]
REGEX = type=proctitle
DEST_KEY = queue
FORMAT = nullQueue

# NOTE - make sure your _raw event has "type=proctitle" in it, change it if the format is different.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps. Kindly accept the answer and upvote the answer if this helps!!!&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 17:47:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/623616#M107292</guid>
      <dc:creator>VatsalJagani</dc:creator>
      <dc:date>2022-12-07T17:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to get linux logs to blacklist in input.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/623631#M107296</link>
      <description>&lt;P&gt;Deny ("black") lists apply only to files.&amp;nbsp; To filter individual events, use transforms as suggested by&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/93915"&gt;@VatsalJagani&lt;/a&gt;&amp;nbsp;or try the new Ingest Action feature, which is similar but a little easier to use.&amp;nbsp; See&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.0.2/Data/DataIngest" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.0.2/Data/DataIngest&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 18:15:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/623631#M107296</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-12-07T18:15:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to get linux logs to blacklist in input.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/625312#M107474</link>
      <description>&lt;P&gt;Hi , Can i push prop.conf and transfrom.conf via deployment server to Universal Forwarder (installed on 600 Linux server)&lt;/P&gt;&lt;P&gt;i am thinking to create these prop and transfroms file on deployment server under /opt/splunk/etc/deployment-apps/&amp;lt;App Name&amp;gt;/local.&lt;/P&gt;&lt;P&gt;will it work&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;shashi&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2022 09:13:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/625312#M107474</guid>
      <dc:creator>shashilendra</dc:creator>
      <dc:date>2022-12-27T09:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to get linux logs to blacklist in input.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/625330#M107476</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/229470"&gt;@shashilendra&lt;/a&gt;&amp;nbsp;- Yes you can push the configuration from the deployment server to UF.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;But&lt;/STRONG&gt;, nullQueue configuration to the machine which &lt;STRONG&gt;parses the logs&lt;/STRONG&gt;. Usually, that's &lt;STRONG&gt;Indexer&lt;/STRONG&gt; (considering the UF is sending logs to Indexers directly.)&lt;/P&gt;&lt;P&gt;* UF does not have the capability to run TRANSFORM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2022 12:48:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/625330#M107476</guid>
      <dc:creator>VatsalJagani</dc:creator>
      <dc:date>2022-12-27T12:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to get linux logs to blacklist in input.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/625332#M107477</link>
      <description>&lt;P&gt;I'd start at the beginning of your process, not at its end.&lt;/P&gt;&lt;P&gt;Make sure you're logging (only) what you need with auditd and understand what you're logging and ingesting.&lt;/P&gt;&lt;P&gt;Cutting some parts of the logs blindly can result in missing information.&lt;/P&gt;&lt;P&gt;See &lt;A href="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sec-understanding_audit_log_files" target="_blank"&gt;https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sec-understanding_audit_log_files&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2022 14:51:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-get-linux-logs-to-blacklist-in-input-conf/m-p/625332#M107477</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2022-12-27T14:51:45Z</dc:date>
    </item>
  </channel>
</rss>

