<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Log filtering before indexing in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Log-filtering-before-indexing/m-p/669332#M112225</link>
    <description>&lt;P&gt;I want to filter the palo logs at the forwarder level by looking at the packet before indexing (licensing) based certain condition like... zone, firewall name (enterprise) etc&lt;/P&gt;&lt;P&gt;The logs come to both our UF &amp;amp; HF, what is the best way to achieve it.&lt;/P&gt;&lt;P&gt;Was looking into a few docs suggesting to apply ingest eval, is that feasible?&lt;/P&gt;&lt;P&gt;Can anyone please help me with this.&lt;/P&gt;</description>
    <pubDate>Tue, 21 Nov 2023 14:14:39 GMT</pubDate>
    <dc:creator>NeharikaVats</dc:creator>
    <dc:date>2023-11-21T14:14:39Z</dc:date>
    <item>
      <title>Log filtering before indexing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Log-filtering-before-indexing/m-p/669332#M112225</link>
      <description>&lt;P&gt;I want to filter the palo logs at the forwarder level by looking at the packet before indexing (licensing) based certain condition like... zone, firewall name (enterprise) etc&lt;/P&gt;&lt;P&gt;The logs come to both our UF &amp;amp; HF, what is the best way to achieve it.&lt;/P&gt;&lt;P&gt;Was looking into a few docs suggesting to apply ingest eval, is that feasible?&lt;/P&gt;&lt;P&gt;Can anyone please help me with this.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 14:14:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Log-filtering-before-indexing/m-p/669332#M112225</guid>
      <dc:creator>NeharikaVats</dc:creator>
      <dc:date>2023-11-21T14:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: Log filtering before indexing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Log-filtering-before-indexing/m-p/669336#M112226</link>
      <description>&lt;P&gt;You need to direct the "unwanted" events to a nullqueue&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 14:45:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Log-filtering-before-indexing/m-p/669336#M112226</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-11-21T14:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: Log filtering before indexing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Log-filtering-before-indexing/m-p/669344#M112228</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/262672"&gt;@NeharikaVats&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you can filter your logs before indexing following the instructions at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.1.1/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.1.1/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You have to apply these configurations in the first Heavy Forwarder you have in your infrastructure.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 15:05:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Log-filtering-before-indexing/m-p/669344#M112228</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-11-21T15:05:28Z</dc:date>
    </item>
  </channel>
</rss>

