<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is there a way to use whitelist or blacklist within linux log files? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Is-there-a-way-to-use-whitelist-or-blacklist-within-linux-log/m-p/645492#M109836</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/224581"&gt;@dieguiariel&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;it's possible to filter events on the Universal Forwarder only for windows events.&lt;/P&gt;&lt;P&gt;For all other events (as Unix events), you can filter events on the Indexers or (when present) on intermediate Heavy Forwarders.&lt;/P&gt;&lt;P&gt;The documentation to do this is at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/latest/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues" target="_blank"&gt;https://docs.splunk.com/Documentation/SplunkCloud/latest/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&lt;/P&gt;&lt;P&gt;in few words, you have to insert:&lt;/P&gt;&lt;P&gt;in props.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[source::/var/log/messages]
TRANSFORMS-null= setnull&lt;/LI-CODE&gt;&lt;P&gt;in transforms.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = snmpd
DEST_KEY = queue
FORMAT = nullQueue&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Fri, 02 Jun 2023 07:36:17 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2023-06-02T07:36:17Z</dc:date>
    <item>
      <title>Is there a way to use whitelist or blacklist within linux log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Is-there-a-way-to-use-whitelist-or-blacklist-within-linux-log/m-p/645438#M109826</link>
      <description>&lt;P&gt;Hi! from the documentation&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/latest/Data/Whitelistorblacklistspecificincomingdata" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/SplunkCloud/latest/Data/Whitelistorblacklistspecificincomingdata&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;the whitelist and blacklist option only works with the filenames of logs.&lt;/P&gt;
&lt;P&gt;Is there an option for data within the log file?&lt;/P&gt;
&lt;P&gt;eg:&lt;/P&gt;
&lt;P&gt;from this extract fo /var/log/messages:&lt;/P&gt;
&lt;P&gt;May 28 18:00:01 xxxxxxxxxx kernel: type=1110 audit(1685311201.838:180500): pid=19649 uid=0 auid=0 ses=24140 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_localuser,pam_unix acct="root" exe="/usr/sbin/crond" hostname=? addr=? terminal=cron res=success'&lt;BR /&gt;May 28 18:00:01 xxxxxxxxxx CROND[19681]: (root) CMD (/usr/lib64/sa/sa1 1 1)&lt;BR /&gt;May 28 18:00:01 xxxxxxxxxx kernel: type=1104 audit(1685311201.905:180501): pid=19649 uid=0 auid=0 ses=24140 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_localuser,pam_unix acct="root" exe="/usr/sbin/crond" hostname=? addr=? terminal=cron res=success'&lt;BR /&gt;May 28 18:00:01 xxxxxxxxxx kernel: type=1106 audit(1685311201.941:180502): pid=19649 uid=0 auid=0 ses=24140 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_loginuid,pam_keyinit,pam_limits,pam_systemd acct="root" exe="/usr/sbin/crond" hostname=? addr=? terminal=cron res=success'&lt;BR /&gt;May 28 18:00:01 svr-spl-mat-01 systemd: Removed slice User Slice of root.&lt;BR /&gt;May 28 18:00:02 svr-spl-mat-01 snmpd[1359]: Connection from UDP: [ xxxxxxxxxx]:50765-&amp;gt;[ xxxxxxxxxx]:161&lt;BR /&gt;May 28 18:00:02 svr-spl-mat-01 snmpd[1359]: Connection from UDP: [ xxxxxxxxxx]:50765-&amp;gt;[ xxxxxxxxxx]:161&lt;BR /&gt;May 28 18:00:02 svr-spl-mat-01 snmpd[1359]: Connection from UDP: [10.138.211.15]:50765-&amp;gt;[ xxxxxxxxxx]:161&lt;/P&gt;
&lt;P&gt;i will like to blacklist all the snmpd events.&lt;/P&gt;
&lt;P&gt;the file used is just an example, the real file is from an application but with sensitive data that i dont want to get into splunk.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2023 06:21:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Is-there-a-way-to-use-whitelist-or-blacklist-within-linux-log/m-p/645438#M109826</guid>
      <dc:creator>dieguiariel</dc:creator>
      <dc:date>2023-06-02T06:21:43Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a way to use whitelist or blacklist within linux log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Is-there-a-way-to-use-whitelist-or-blacklist-within-linux-log/m-p/645492#M109836</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/224581"&gt;@dieguiariel&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;it's possible to filter events on the Universal Forwarder only for windows events.&lt;/P&gt;&lt;P&gt;For all other events (as Unix events), you can filter events on the Indexers or (when present) on intermediate Heavy Forwarders.&lt;/P&gt;&lt;P&gt;The documentation to do this is at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/latest/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues" target="_blank"&gt;https://docs.splunk.com/Documentation/SplunkCloud/latest/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&lt;/P&gt;&lt;P&gt;in few words, you have to insert:&lt;/P&gt;&lt;P&gt;in props.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[source::/var/log/messages]
TRANSFORMS-null= setnull&lt;/LI-CODE&gt;&lt;P&gt;in transforms.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = snmpd
DEST_KEY = queue
FORMAT = nullQueue&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2023 07:36:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Is-there-a-way-to-use-whitelist-or-blacklist-within-linux-log/m-p/645492#M109836</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-06-02T07:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a way to use whitelist or blacklist within linux log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Is-there-a-way-to-use-whitelist-or-blacklist-within-linux-log/m-p/645558#M109842</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Giuseppe, thanks one more cuestion,&amp;nbsp; reading the doc it says:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You can eliminate unwanted data by routing it to the&amp;nbsp;nullQueue, the Splunk equivalent of the Unix&amp;nbsp;/dev/null&amp;nbsp;device. When you filter out data in this way, the data is not forwarded and &lt;STRONG&gt;doesn't count toward your indexing volume.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;so, when applied this on the indexer, has impact on the daily license?, lets say that the events filtered out are around 2gb daily, i'll save 2 gb?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2023 13:20:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Is-there-a-way-to-use-whitelist-or-blacklist-within-linux-log/m-p/645558#M109842</guid>
      <dc:creator>dieguiariel</dc:creator>
      <dc:date>2023-06-02T13:20:51Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a way to use whitelist or blacklist within linux log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Is-there-a-way-to-use-whitelist-or-blacklist-within-linux-log/m-p/645767#M109871</link>
      <description>&lt;P&gt;tried the solution and works perfectly. Also is saving license.&lt;/P&gt;&lt;P&gt;The files were created on:&lt;/P&gt;&lt;P&gt;$SplunkHOME/etc/system/local/&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 12:47:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Is-there-a-way-to-use-whitelist-or-blacklist-within-linux-log/m-p/645767#M109871</guid>
      <dc:creator>dieguiariel</dc:creator>
      <dc:date>2023-06-05T12:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a way to use whitelist or blacklist within linux log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Is-there-a-way-to-use-whitelist-or-blacklist-within-linux-log/m-p/645771#M109872</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/224581"&gt;@dieguiariel&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;yes,&amp;nbsp;&lt;SPAN&gt;the&amp;nbsp;nullQueue is the Splunk equivalent of the Unix&amp;nbsp;/dev/null&amp;nbsp;device.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;in Splunk you consume license only for the indexed logs, if you filter a data source before indexing, you don't consume license for the deleted logs.&lt;/P&gt;&lt;P&gt;Obviously you cannot use these filtered logs.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 13:08:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Is-there-a-way-to-use-whitelist-or-blacklist-within-linux-log/m-p/645771#M109872</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-06-05T13:08:57Z</dc:date>
    </item>
  </channel>
</rss>

