<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: syslog (udp:514) filtering in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94375#M19626</link>
    <description>&lt;P&gt;sourcetype=syslog comes out of the facts that I deciced to takes this as the sourcetype. No rewrite takes place. I used the stanza [source::udp:8514] which raieses the same questions.&lt;/P&gt;

&lt;P&gt;By the way, syslog udp port 514 is natted to udp port 8514 with iptables. That works quite fine.&lt;/P&gt;

&lt;P&gt;inputs.conf&lt;BR /&gt;
[udp://8514]&lt;BR /&gt;
sourcetype = syslog&lt;/P&gt;</description>
    <pubDate>Tue, 10 Jul 2012 13:16:51 GMT</pubDate>
    <dc:creator>weigeltf</dc:creator>
    <dc:date>2012-07-10T13:16:51Z</dc:date>
    <item>
      <title>syslog (udp:514) filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94373#M19624</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I am wondering if my question couldn't get answered quickly. I have parsed many very similiar questions and tried to find my way out from the answers. Here is my situation.&lt;/P&gt;

&lt;P&gt;I get too many syslog messages on sourec::udp:514 as sourcetype=syslog. Within those messages many are not of interest for my purpose. So I want to get rid of some of them to protect my indexing license against overflow.&lt;/P&gt;

&lt;P&gt;As I said, I have done some configuration but I am absolutely unsure if this works and if, how I can control and check the behaviour. Is there somebody out in the field who is willing to answer my questions.&lt;/P&gt;

&lt;P&gt;Thanks for your help.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;[sourcetype::syslog]&lt;/P&gt;

&lt;P&gt;TRANSFORMS-asa= asa_teardown_null,asa_built_null&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;[asa_teardown_null]&lt;/P&gt;

&lt;P&gt;DEST_KEY = queue&lt;/P&gt;

&lt;P&gt;FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;REGEX = (ASA-6-302014|ASA-6-302016|ASA-6-302018|ASA-6-302021|ASA-6-302304|ASA-6&lt;BR /&gt;
-305010|ASA-6-305012|ASA-6-603109|ASA-6-617100)&lt;/P&gt;

&lt;P&gt;[asa_built_null]&lt;/P&gt;

&lt;P&gt;DEST_KEY = queue&lt;/P&gt;

&lt;P&gt;FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;REGEX = (ASA-6-302003|ASA-6-302009|ASA-6-302013|ASA-6-302017|ASA-6-302020|ASA-6&lt;BR /&gt;
-305009|ASA-6-305011|ASA-6-603108|ASA-6-302013|ASA-6-302015)&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 12:03:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94373#M19624</guid>
      <dc:creator>weigeltf</dc:creator>
      <dc:date>2020-09-28T12:03:04Z</dc:date>
    </item>
    <item>
      <title>Re: syslog (udp:514) filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94374#M19625</link>
      <description>&lt;P&gt;Do you know for a fact that your data has sourcetype "syslog" when Splunk indexes it, or is it dynamically rewritten in a transform somewhere? Because if it is, that could cause the stanza in props.conf not to take effect.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jul 2012 13:09:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94374#M19625</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-07-10T13:09:56Z</dc:date>
    </item>
    <item>
      <title>Re: syslog (udp:514) filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94375#M19626</link>
      <description>&lt;P&gt;sourcetype=syslog comes out of the facts that I deciced to takes this as the sourcetype. No rewrite takes place. I used the stanza [source::udp:8514] which raieses the same questions.&lt;/P&gt;

&lt;P&gt;By the way, syslog udp port 514 is natted to udp port 8514 with iptables. That works quite fine.&lt;/P&gt;

&lt;P&gt;inputs.conf&lt;BR /&gt;
[udp://8514]&lt;BR /&gt;
sourcetype = syslog&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jul 2012 13:16:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94375#M19626</guid>
      <dc:creator>weigeltf</dc:creator>
      <dc:date>2012-07-10T13:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: syslog (udp:514) filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94376#M19627</link>
      <description>&lt;P&gt;[sourcetype::syslog] is not a valid way of calling a props.conf entry for sourcetype. The rest of the transform looks ok. However, this syntax needs to be corrected or things won't work. If 'syslog' is the sourcetype of these events, your stanza should look like this:&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;P&gt;[syslog]&lt;/P&gt;

&lt;P&gt;TRANSFORMS-asa= asa_teardown_null,asa_built_null&lt;/P&gt;

&lt;P&gt;props.conf.spec can be found in $SPLUNK_HOME/etc/system/README, or @ &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/admin/propsconf" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/latest/admin/propsconf&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Please see the following section:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[&amp;lt;spec&amp;gt;]
* This stanza enables properties for a given &amp;lt;spec&amp;gt;.
* A props.conf file can contain multiple stanzas for any number of different &amp;lt;spec&amp;gt;.
* Follow this stanza name with any number of the following attribute/value pairs, as appropriate
  for what you want to do.
* If you do not set an attribute for a given &amp;lt;spec&amp;gt;, the default is used.

&amp;lt;spec&amp;gt; can be:
1. &amp;lt;sourcetype&amp;gt;, the source type of an event.
2. host::&amp;lt;host&amp;gt;, where &amp;lt;host&amp;gt; is the host for an event.
3. source::&amp;lt;source&amp;gt;, where &amp;lt;source&amp;gt; is the source for an event.
4. rule::&amp;lt;rulename&amp;gt;, where &amp;lt;rulename&amp;gt; is a unique name of a source type classification rule.
5. delayedrule::&amp;lt;rulename&amp;gt;, where &amp;lt;rulename&amp;gt; is a unique name of a delayed source type
   classification rule.
These are only considered as a last resort before generating a new source type based on the
source seen.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Please note that there isn't a sourcetype::&lt;SOURCETYPE&gt; specification anywhere in this area. &lt;/SOURCETYPE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 12:03:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94376#M19627</guid>
      <dc:creator>jbsplunk</dc:creator>
      <dc:date>2020-09-28T12:03:18Z</dc:date>
    </item>
    <item>
      <title>Re: syslog (udp:514) filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94377#M19628</link>
      <description>&lt;P&gt;jbsplunk, thanks. &lt;BR /&gt;
Good and fast answer. It works. I have checked and the nullQueue regexed records don't appear any longer.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jul 2012 18:23:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94377#M19628</guid>
      <dc:creator>weigeltf</dc:creator>
      <dc:date>2012-07-10T18:23:48Z</dc:date>
    </item>
    <item>
      <title>Re: syslog (udp:514) filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94378#M19629</link>
      <description>&lt;P&gt;You can't see the specific events that were routed to nullQueue, which is kind of the point. However, you will see entries in metrics.log:&lt;/P&gt;

&lt;P&gt;INFO Metrics - group=pipeline, name=dev-null, processor=nullqueue, cpu_seconds=0.000000, executes=4450, cumulative_hits=3469242&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 12:03:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/syslog-udp-514-filtering/m-p/94378#M19629</guid>
      <dc:creator>jbsplunk</dc:creator>
      <dc:date>2020-09-28T12:03:20Z</dc:date>
    </item>
  </channel>
</rss>

