<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Question on dropping certain syslog events in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Question-on-dropping-certain-syslog-events/m-p/526589#M88819</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/169533"&gt;@BrendanCO&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;it isn't possible to filter data on inputs.conf, with the only exception of wineventlogs.&lt;/P&gt;&lt;P&gt;So, you have to analyze your logs and find a rule&amp;nbsp; (to transform in a regex) to exactly identify the logs to discard: e.g. if you found that the events in the sourcetype "your_sourcetype" containing the string "INFO" are to drop before indexing, you can create a rule in props.conf and transforms.conf like this:&lt;/P&gt;&lt;P&gt;props.conf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[your_sourcetype]
TRANSFORMS-drop_PA_events = drop_PA_events&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;transforms.conf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[drop_PA_events]
REGEX = INFO
DEST_KEY = queue
FORMAT = nullQueue&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remember that these props.conf and transforms.conf must be on Indexers and (when present) on Heavy Forwarders.&lt;/P&gt;&lt;P&gt;You can find more infos at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.1.0/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/Splunk/8.1.0/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Tue, 27 Oct 2020 07:12:58 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2020-10-27T07:12:58Z</dc:date>
    <item>
      <title>Question on dropping certain syslog events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Question-on-dropping-certain-syslog-events/m-p/526547#M88816</link>
      <description>&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Hi guys. I've got both Palo Alto and Fortinet logs coming in to my Splunk instances and have the appropriate apps set up for each. The thing I'd like to do is see if there are any chatty and mostly useless events I can have Splunk drop and not process before it is received and counted against my license. Palos are pretty good about how to trim in the FW itself but the Fortinet isn't quite as granular.&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Is there something I can put an inputs.conf file (or another similar app conf file) that will tell it to just drop an incoming event if it contains X?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 22:38:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Question-on-dropping-certain-syslog-events/m-p/526547#M88816</guid>
      <dc:creator>BrendanCO</dc:creator>
      <dc:date>2020-10-26T22:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: Question on dropping certain syslog events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Question-on-dropping-certain-syslog-events/m-p/526589#M88819</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/169533"&gt;@BrendanCO&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;it isn't possible to filter data on inputs.conf, with the only exception of wineventlogs.&lt;/P&gt;&lt;P&gt;So, you have to analyze your logs and find a rule&amp;nbsp; (to transform in a regex) to exactly identify the logs to discard: e.g. if you found that the events in the sourcetype "your_sourcetype" containing the string "INFO" are to drop before indexing, you can create a rule in props.conf and transforms.conf like this:&lt;/P&gt;&lt;P&gt;props.conf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[your_sourcetype]
TRANSFORMS-drop_PA_events = drop_PA_events&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;transforms.conf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[drop_PA_events]
REGEX = INFO
DEST_KEY = queue
FORMAT = nullQueue&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remember that these props.conf and transforms.conf must be on Indexers and (when present) on Heavy Forwarders.&lt;/P&gt;&lt;P&gt;You can find more infos at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.1.0/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/Splunk/8.1.0/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 07:12:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Question-on-dropping-certain-syslog-events/m-p/526589#M88819</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-10-27T07:12:58Z</dc:date>
    </item>
  </channel>
</rss>

