<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Windows DNS Drop line via nullQueue not working in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Drop-line-via-nullQueue-not-working/m-p/278997#M53389</link>
    <description>&lt;P&gt;I'm trying to drop DNS requests for internal names from our Windows DNS logs. For a guide I am using an answer from this question:&lt;BR /&gt;
&lt;A href="https://answers.splunk.com/answers/35259/best-method-for-pulling-microsoft-dns-logs-with-splunk.html"&gt;https://answers.splunk.com/answers/35259/best-method-for-pulling-microsoft-dns-logs-with-splunk.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;We have two TLDs I'd like to filter out, for example bob.local and fred.local&lt;/P&gt;

&lt;P&gt;I've added the following to my props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[win_dns]
TRANSFORMS-drop = win_dns_ignorelogs
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And the following to my transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[win_dns_ignorelogs]
REGEX =(?i)\.*(bob|fred)\.local
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And restarted Splunk.&lt;/P&gt;

&lt;P&gt;One thing to note is that we have a SED command in the props.conf which replaces the standard formatting of the records from something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;13/12/2015 9:29:58 AM 0678 PACKET  0000000001FE2D10 TCP Rcv 127.0.0.1       4a3f   Q [0001   D   NOERROR] NS     (8)bob(3)local(0)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;To something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;13/12/2015 9:29:58 AM 0678 PACKET  0000000001FE2D10 TDP Rcv 127.0.0.1       4a3f   Q [0001   D   NOERROR] NS    bob.local
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Via and entry in the props.conf like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::win_dns]
SEDCMD-DNSZones1 = s/\s\(.{1,4}\)// s/\(.{1,4}\)$// s/\(.{1,4}\)/./g
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;When I test the regex in search like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=win_dns questionName="bob.local" | regex _raw="(?i)\.*(bob|fred)\.local"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It matches the events I am expecting to drop, but the events are still being indexed. Can someone please help me out?&lt;/P&gt;</description>
    <pubDate>Mon, 14 Dec 2015 00:51:35 GMT</pubDate>
    <dc:creator>JeremyHagan</dc:creator>
    <dc:date>2015-12-14T00:51:35Z</dc:date>
    <item>
      <title>Windows DNS Drop line via nullQueue not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Drop-line-via-nullQueue-not-working/m-p/278997#M53389</link>
      <description>&lt;P&gt;I'm trying to drop DNS requests for internal names from our Windows DNS logs. For a guide I am using an answer from this question:&lt;BR /&gt;
&lt;A href="https://answers.splunk.com/answers/35259/best-method-for-pulling-microsoft-dns-logs-with-splunk.html"&gt;https://answers.splunk.com/answers/35259/best-method-for-pulling-microsoft-dns-logs-with-splunk.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;We have two TLDs I'd like to filter out, for example bob.local and fred.local&lt;/P&gt;

&lt;P&gt;I've added the following to my props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[win_dns]
TRANSFORMS-drop = win_dns_ignorelogs
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And the following to my transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[win_dns_ignorelogs]
REGEX =(?i)\.*(bob|fred)\.local
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And restarted Splunk.&lt;/P&gt;

&lt;P&gt;One thing to note is that we have a SED command in the props.conf which replaces the standard formatting of the records from something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;13/12/2015 9:29:58 AM 0678 PACKET  0000000001FE2D10 TCP Rcv 127.0.0.1       4a3f   Q [0001   D   NOERROR] NS     (8)bob(3)local(0)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;To something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;13/12/2015 9:29:58 AM 0678 PACKET  0000000001FE2D10 TDP Rcv 127.0.0.1       4a3f   Q [0001   D   NOERROR] NS    bob.local
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Via and entry in the props.conf like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::win_dns]
SEDCMD-DNSZones1 = s/\s\(.{1,4}\)// s/\(.{1,4}\)$// s/\(.{1,4}\)/./g
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;When I test the regex in search like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=win_dns questionName="bob.local" | regex _raw="(?i)\.*(bob|fred)\.local"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It matches the events I am expecting to drop, but the events are still being indexed. Can someone please help me out?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 00:51:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Drop-line-via-nullQueue-not-working/m-p/278997#M53389</guid>
      <dc:creator>JeremyHagan</dc:creator>
      <dc:date>2015-12-14T00:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS Drop line via nullQueue not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Drop-line-via-nullQueue-not-working/m-p/278998#M53390</link>
      <description>&lt;P&gt;Hi JeremyHagan,&lt;/P&gt;

&lt;P&gt;combine the &lt;CODE&gt;props.conf&lt;/CODE&gt; into one stanza, because your events will only be parsed once by Splunk. So either do something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::win_dns]
SEDCMD-DNSZones1 = s/\s\(.{1,4}\)// s/\(.{1,4}\)$// s/\(.{1,4}\)/./g
TRANSFORMS-drop = win_dns_ignorelogs
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;or&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[win_dns]
SEDCMD-DNSZones1 = s/\s\(.{1,4}\)// s/\(.{1,4}\)$// s/\(.{1,4}\)/./g
TRANSFORMS-drop = win_dns_ignorelogs
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope this helps ...&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 01:57:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Drop-line-via-nullQueue-not-working/m-p/278998#M53390</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-12-14T01:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS Drop line via nullQueue not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Drop-line-via-nullQueue-not-working/m-p/278999#M53391</link>
      <description>&lt;P&gt;Ahh, that makes sense. I've made the update and scheduled a restart for tomorrow morning. I'll provide more feedback tomorrow.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 02:43:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Drop-line-via-nullQueue-not-working/m-p/278999#M53391</guid>
      <dc:creator>JeremyHagan</dc:creator>
      <dc:date>2015-12-14T02:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS Drop line via nullQueue not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Drop-line-via-nullQueue-not-working/m-p/279000#M53392</link>
      <description>&lt;P&gt;Thanks for the karma, but up voting will not take your karma away &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; see this &lt;A href="https://answers.splunk.com/answers/334246/need-info-about-the-karma-points-system.html"&gt;https://answers.splunk.com/answers/334246/need-info-about-the-karma-points-system.html&lt;/A&gt; for more details &lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 02:47:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Drop-line-via-nullQueue-not-working/m-p/279000#M53392</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-12-14T02:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS Drop line via nullQueue not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Drop-line-via-nullQueue-not-working/m-p/279001#M53393</link>
      <description>&lt;P&gt;I can confirm that this worked. Thanks MuS&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 21:58:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Drop-line-via-nullQueue-not-working/m-p/279001#M53393</guid>
      <dc:creator>JeremyHagan</dc:creator>
      <dc:date>2015-12-14T21:58:37Z</dc:date>
    </item>
  </channel>
</rss>

