<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Splunk Deployment App Filtering SharePoint Logs in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749222#M119052</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Splunk Community,&lt;/P&gt;&lt;P&gt;I’m trying to reduce disk space usage on my Splunk Universal Forwarder by filtering out unnecessary SharePoint logs and only forwarding those with a severity of High, error, or warning in the message&lt;/P&gt;&lt;P&gt;I created a deployment app named SharePoint. here is what's in that folder:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tbarn005_0-1751572966537.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/39566i9FC238028380449F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="tbarn005_0-1751572966537.png" alt="tbarn005_0-1751572966537.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I attempted to create a props and transforms.conf files to filter out the data that was unnecessary. i only need to see the log files in the dir that have certain key words not all of those logs here is what i wrote in the files. I didn't write the regex myself i found something similar to it online somewhere and tried to make it work for my environment&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tbarn005_1-1751573106509.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/39567i4A3FF01CDA398843/image-size/medium?v=v2&amp;amp;px=400" role="button" title="tbarn005_1-1751573106509.png" alt="tbarn005_1-1751573106509.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;After deploying this i now do not see any of my SharePoint logs indexed at all for this specific server even the ones with high. As you can see from the logs i even pointed them at a test index that i made so i should be seeing them I'm not sure what's going on.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 03 Jul 2025 20:08:32 GMT</pubDate>
    <dc:creator>tbarn005</dc:creator>
    <dc:date>2025-07-03T20:08:32Z</dc:date>
    <item>
      <title>Splunk Deployment App Filtering SharePoint Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749222#M119052</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Splunk Community,&lt;/P&gt;&lt;P&gt;I’m trying to reduce disk space usage on my Splunk Universal Forwarder by filtering out unnecessary SharePoint logs and only forwarding those with a severity of High, error, or warning in the message&lt;/P&gt;&lt;P&gt;I created a deployment app named SharePoint. here is what's in that folder:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tbarn005_0-1751572966537.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/39566i9FC238028380449F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="tbarn005_0-1751572966537.png" alt="tbarn005_0-1751572966537.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I attempted to create a props and transforms.conf files to filter out the data that was unnecessary. i only need to see the log files in the dir that have certain key words not all of those logs here is what i wrote in the files. I didn't write the regex myself i found something similar to it online somewhere and tried to make it work for my environment&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tbarn005_1-1751573106509.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/39567i4A3FF01CDA398843/image-size/medium?v=v2&amp;amp;px=400" role="button" title="tbarn005_1-1751573106509.png" alt="tbarn005_1-1751573106509.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;After deploying this i now do not see any of my SharePoint logs indexed at all for this specific server even the ones with high. As you can see from the logs i even pointed them at a test index that i made so i should be seeing them I'm not sure what's going on.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2025 20:08:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749222#M119052</guid>
      <dc:creator>tbarn005</dc:creator>
      <dc:date>2025-07-03T20:08:32Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Deployment App Filtering SharePoint Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749223#M119053</link>
      <description>&lt;P&gt;There appear to be a few problems here.&lt;/P&gt;&lt;P&gt;1) The SharePoint app should have a single folder called 'default'.&amp;nbsp; The default folder should contain the files shown in the first screenshot.&lt;/P&gt;&lt;P&gt;2) Universal Forwarders do not consume disk space so filtering will not save any there.&amp;nbsp; Caveat: if you use persistent queuing then the UF will use disk space, but the space will be returned once the queue is drained.&lt;/P&gt;&lt;P&gt;3) Universal Forwarders do not process transforms so they cannot filter events this way.&amp;nbsp; Put the props and transforms on the first full instance that touches the data (indexer or heavy forwarder).&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2025 20:43:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749223#M119053</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2025-07-03T20:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Deployment App Filtering SharePoint Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749224#M119054</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/274539"&gt;@tbarn005&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I just check, you want to reduce your storage usage on your Universal Forwarder, but the UF isnt storing your data ingested, its only sending it on.&amp;nbsp;&lt;/P&gt;&lt;P&gt;UFs are typically not used for parsing the data. Did you apply the screenshotted configuration to your UF or a different (HF/IDX) instance?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2025 20:44:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749224#M119054</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-07-03T20:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Deployment App Filtering SharePoint Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749225#M119055</link>
      <description>&lt;P&gt;I may have misspoken i want to reduce the storage usage on my indexer.&amp;nbsp; I have a SharePoint server that has Splunk UF on it and its ingesting unnecessary data that is eating a lot of storage on my indexer. The screen shots come from my indexer. Im doing a bit of research now and it looks as if i can use the ingest actions to possibly filter out some of that unnecessary data from that sharepoint UF?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2025 20:47:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749225#M119055</guid>
      <dc:creator>tbarn005</dc:creator>
      <dc:date>2025-07-03T20:47:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Deployment App Filtering SharePoint Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749240#M119056</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/274539"&gt;@tbarn005&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your props and transform looks ok. Make sure you are applying this to HF or Indexer not on the UF. Also add one more transform to filter out other noise.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[source::E:\\SPLogs\\CLGDEVSPAPPSO1*]&lt;BR /&gt;TRANSFORMS-debug = route_high_to_debug,drop_noise&lt;/P&gt;&lt;P&gt;In &lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;BR /&gt;[drop_noise]&lt;BR /&gt;REGEX = .&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;&lt;P&gt;Restart Splunk and check again. Also make sure you have new high category logs from this server.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Prewin&lt;BR /&gt;Splunk Enthusiast | Always happy to help! If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jul 2025 04:32:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749240#M119056</guid>
      <dc:creator>PrewinThomas</dc:creator>
      <dc:date>2025-07-04T04:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Deployment App Filtering SharePoint Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749572#M119083</link>
      <description>&lt;P&gt;Sorry about the week late reply but that does not seem to work. I am still getting logs that i dont need i just disabled ingestion from that folder location. Does splunk have any app that would filter data easier than creating the transforms and props.conf files?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 14:56:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749572#M119083</guid>
      <dc:creator>tbarn005</dc:creator>
      <dc:date>2025-07-10T14:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Deployment App Filtering SharePoint Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749573#M119084</link>
      <description>&lt;P&gt;Try Ingest Actions.&amp;nbsp; They're easy to use and even have a preview GUI so you know they'll work before they're implemented.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 15:03:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Deployment-App-Filtering-SharePoint-Logs/m-p/749573#M119084</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2025-07-10T15:03:22Z</dc:date>
    </item>
  </channel>
</rss>

