<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filter out logs using props.conf and transfors.conf in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213839#M42038</link>
    <description>&lt;P&gt;I believe sourcetype renaming is only applied at search time, so the [opsec] stanza in props.conf would not be picked up during the parsing phase. &lt;/P&gt;

&lt;P&gt;What happens if you change your props.conf to:&lt;BR /&gt;
    [source::...opsec]&lt;BR /&gt;
    sourcetype = opsec&lt;BR /&gt;
    TRANSFORMS-set= setnull, setparsing&lt;/P&gt;

&lt;P&gt;If you still have problems, try adding the config to your indexers too. To rename the sourcetype, add a props.conf to your search head(s):&lt;BR /&gt;
    [source::...opsec]&lt;BR /&gt;
    sourcetype = opsec&lt;/P&gt;</description>
    <pubDate>Mon, 22 Feb 2016 21:41:43 GMT</pubDate>
    <dc:creator>masonmorales</dc:creator>
    <dc:date>2016-02-22T21:41:43Z</dc:date>
    <item>
      <title>Filter out logs using props.conf and transfors.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213833#M42032</link>
      <description>&lt;P&gt;I am pulling logs from the firewalls via scripts on a heavy forwarder (via scrips from the app for Checkpoint). How to create props.conf and transfoms.conf to filter some logs from being indexed by the indexers. And where to put them? In the $Splunk/etc/apps/APP_NAME/local folder or in the $SPLUNK/etc/system/local/ folder on the heavy forwarder?&lt;/P&gt;

&lt;P&gt;This is what I've got so far and it doesn't seem to be picking up the logs that I want to filter out. &lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;props.conf:&lt;/STRONG&gt; &lt;BR /&gt;
[source::...opsec]&lt;BR /&gt;
sourcetype = opsec&lt;/P&gt;

&lt;P&gt;[opsec]&lt;BR /&gt;
TRANSFORMS-set= setnull, setparsing&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;BR /&gt;
[setnull]&lt;BR /&gt;
REGEX = LAB&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;[setparsing]&lt;BR /&gt;
REGEX = .&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = indexQueue&lt;/P&gt;</description>
      <pubDate>Sat, 20 Feb 2016 01:35:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213833#M42032</guid>
      <dc:creator>daniel_augustyn</dc:creator>
      <dc:date>2016-02-20T01:35:11Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out logs using props.conf and transfors.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213834#M42033</link>
      <description>&lt;P&gt;You can put your props.conf and transforms.conf in an app or under system/local.  The system/local directory will win out over anything you have set it an app. &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/admin/Wheretofindtheconfigurationfiles"&gt;http://docs.splunk.com/Documentation/Splunk/latest/admin/Wheretofindtheconfigurationfiles&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Using an app is generally a good idea, because it allows you to package and re-deploy it if you need to.  Some people will put all of their index-time props and transforms in a single app, others break them up by technology or application.  Thats more a matter of preference and what works best for you.&lt;/P&gt;

&lt;P&gt;For the settings you have here, I would do one of two things.  Either set the sourcetype in your inputs.conf file so you don't have to set it in your props.conf, or move your TRANSFORM to your source stanza:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::...opsec]
sourcetype = opsec
TRANSFORMS-set= setnull, setparsing
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 20 Feb 2016 16:57:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213834#M42033</guid>
      <dc:creator>Jeremiah</dc:creator>
      <dc:date>2016-02-20T16:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out logs using props.conf and transfors.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213835#M42034</link>
      <description>&lt;P&gt;The regex doesn't seem to be picking up the events I want to filter out: REGEX = LAB&lt;/P&gt;

&lt;P&gt;I am still getting all of the event with "LAB" word indexed. &lt;/P&gt;</description>
      <pubDate>Sat, 20 Feb 2016 21:15:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213835#M42034</guid>
      <dc:creator>daniel_augustyn</dc:creator>
      <dc:date>2016-02-20T21:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out logs using props.conf and transfors.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213836#M42035</link>
      <description>&lt;P&gt;It still doesn't seem to be picking up the events with "LAB" word in them. Is there something wrong with the code in any of these files? &lt;/P&gt;</description>
      <pubDate>Mon, 22 Feb 2016 05:56:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213836#M42035</guid>
      <dc:creator>daniel_augustyn</dc:creator>
      <dc:date>2016-02-22T05:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out logs using props.conf and transfors.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213837#M42036</link>
      <description>&lt;P&gt;Actually looking at what you have, since you want to drop events with "LAB", you just need the setnull transform, not the setparsing.&lt;/P&gt;

&lt;P&gt;TRANSFORMS-set = setnull&lt;/P&gt;

&lt;P&gt;You can see something similar here:&lt;/P&gt;

&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/107605/filtering-events-out-via-props-conf-and-transforms-conf.html"&gt;https://answers.splunk.com/answers/107605/filtering-events-out-via-props-conf-and-transforms-conf.html&lt;/A&gt;&lt;BR /&gt;
and here&lt;BR /&gt;
&lt;A href="https://answers.splunk.com/answers/293599/how-to-configure-propsconf-and-transformsconf-to-f-2.html"&gt;https://answers.splunk.com/answers/293599/how-to-configure-propsconf-and-transformsconf-to-f-2.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Feb 2016 06:25:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213837#M42036</guid>
      <dc:creator>Jeremiah</dc:creator>
      <dc:date>2016-02-22T06:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out logs using props.conf and transfors.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213838#M42037</link>
      <description>&lt;P&gt;Still doesn't pick up the events I want to filter out. Is this something off with this: &lt;BR /&gt;
 [source::...opsec]&lt;BR /&gt;
 sourcetype = opsec&lt;/P&gt;</description>
      <pubDate>Mon, 22 Feb 2016 20:59:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213838#M42037</guid>
      <dc:creator>daniel_augustyn</dc:creator>
      <dc:date>2016-02-22T20:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out logs using props.conf and transfors.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213839#M42038</link>
      <description>&lt;P&gt;I believe sourcetype renaming is only applied at search time, so the [opsec] stanza in props.conf would not be picked up during the parsing phase. &lt;/P&gt;

&lt;P&gt;What happens if you change your props.conf to:&lt;BR /&gt;
    [source::...opsec]&lt;BR /&gt;
    sourcetype = opsec&lt;BR /&gt;
    TRANSFORMS-set= setnull, setparsing&lt;/P&gt;

&lt;P&gt;If you still have problems, try adding the config to your indexers too. To rename the sourcetype, add a props.conf to your search head(s):&lt;BR /&gt;
    [source::...opsec]&lt;BR /&gt;
    sourcetype = opsec&lt;/P&gt;</description>
      <pubDate>Mon, 22 Feb 2016 21:41:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213839#M42038</guid>
      <dc:creator>masonmorales</dc:creator>
      <dc:date>2016-02-22T21:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out logs using props.conf and transfors.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213840#M42039</link>
      <description>&lt;P&gt;It started picking up after I had deleted these two files and created new ones. And after I rebooted the heavy forwarder. I still don't know what was the issue at the first place, since the files look identical and I was rebooting Splunk before after each change. &lt;/P&gt;</description>
      <pubDate>Mon, 22 Feb 2016 23:01:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filter-out-logs-using-props-conf-and-transfors-conf/m-p/213840#M42039</guid>
      <dc:creator>daniel_augustyn</dc:creator>
      <dc:date>2016-02-22T23:01:24Z</dc:date>
    </item>
  </channel>
</rss>

