<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Forward matching events to a third party system. in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Forward-matching-events-to-a-third-party-system/m-p/486621#M83333</link>
    <description>&lt;P&gt;I would like to understand if the following requirement can be made to work..&lt;/P&gt;

&lt;P&gt;We are ingesting AWS Cloudtrail events, via the Splunk Add on for AWS. The app is installed on our indexer so we aren't currently going via a heavy forwarder. The Cloudtrail event data currently goes from our AWS account  to an S3 bucket and then into Splunk via SQS.&lt;/P&gt;

&lt;P&gt;Our client has a new requirement to ensure that only particular Cloudtrail events, like 'password reset' or 'failed login' are sent to a third party log rhythm server but are also still indexed in our Splunk environment. I've read the documentation and this seems to fall under the following articles: &lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.1/Search/Forwarddatatothirdpartysystems" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.1/Search/Forwarddatatothirdpartysystems&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Routeandfilterdatad#Replicate_a_subset_of_data_to_a_third-party_system" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Routeandfilterdatad#Replicate_a_subset_of_data_to_a_third-party_system&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I've tested with the following configuration, just searching for a simple error string. However I end up with data indexed TWICE at our end. &lt;/P&gt;

&lt;P&gt;props.conf&lt;BR /&gt;
[default]&lt;BR /&gt;
TRANSFORMS-routing=TestErrors&lt;/P&gt;

&lt;P&gt;Transforms.conf&lt;BR /&gt;
[TestErrors]&lt;BR /&gt;
REGEX = awerror12345&lt;BR /&gt;
DEST_KEY = _MetaData:Index&lt;BR /&gt;
FORMAT = index&lt;BR /&gt;
DEST_KEY=_TCP_ROUTING&lt;BR /&gt;
FORMAT=TestErrors&lt;/P&gt;

&lt;P&gt;outputs.conf&lt;BR /&gt;
[tcpout:TestErrors]&lt;BR /&gt;
server=x.x.x.x:9999&lt;/P&gt;

&lt;P&gt;Is it possible to filter events using regex, send them to a third party AND index them at our end possible? &lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 03:42:57 GMT</pubDate>
    <dc:creator>Stokers_23</dc:creator>
    <dc:date>2020-09-30T03:42:57Z</dc:date>
    <item>
      <title>Forward matching events to a third party system.</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-matching-events-to-a-third-party-system/m-p/486621#M83333</link>
      <description>&lt;P&gt;I would like to understand if the following requirement can be made to work..&lt;/P&gt;

&lt;P&gt;We are ingesting AWS Cloudtrail events, via the Splunk Add on for AWS. The app is installed on our indexer so we aren't currently going via a heavy forwarder. The Cloudtrail event data currently goes from our AWS account  to an S3 bucket and then into Splunk via SQS.&lt;/P&gt;

&lt;P&gt;Our client has a new requirement to ensure that only particular Cloudtrail events, like 'password reset' or 'failed login' are sent to a third party log rhythm server but are also still indexed in our Splunk environment. I've read the documentation and this seems to fall under the following articles: &lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.1/Search/Forwarddatatothirdpartysystems" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.1/Search/Forwarddatatothirdpartysystems&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Routeandfilterdatad#Replicate_a_subset_of_data_to_a_third-party_system" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Routeandfilterdatad#Replicate_a_subset_of_data_to_a_third-party_system&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I've tested with the following configuration, just searching for a simple error string. However I end up with data indexed TWICE at our end. &lt;/P&gt;

&lt;P&gt;props.conf&lt;BR /&gt;
[default]&lt;BR /&gt;
TRANSFORMS-routing=TestErrors&lt;/P&gt;

&lt;P&gt;Transforms.conf&lt;BR /&gt;
[TestErrors]&lt;BR /&gt;
REGEX = awerror12345&lt;BR /&gt;
DEST_KEY = _MetaData:Index&lt;BR /&gt;
FORMAT = index&lt;BR /&gt;
DEST_KEY=_TCP_ROUTING&lt;BR /&gt;
FORMAT=TestErrors&lt;/P&gt;

&lt;P&gt;outputs.conf&lt;BR /&gt;
[tcpout:TestErrors]&lt;BR /&gt;
server=x.x.x.x:9999&lt;/P&gt;

&lt;P&gt;Is it possible to filter events using regex, send them to a third party AND index them at our end possible? &lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:42:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-matching-events-to-a-third-party-system/m-p/486621#M83333</guid>
      <dc:creator>Stokers_23</dc:creator>
      <dc:date>2020-09-30T03:42:57Z</dc:date>
    </item>
  </channel>
</rss>

