<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: udp://514 input exclusion in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/udp-514-input-exclusion/m-p/557234#M10615</link>
    <description>&lt;P&gt;Thanks for your help! This did exactly what I was looking for.&lt;/P&gt;</description>
    <pubDate>Fri, 25 Jun 2021 18:47:17 GMT</pubDate>
    <dc:creator>joeybroesky</dc:creator>
    <dc:date>2021-06-25T18:47:17Z</dc:date>
    <item>
      <title>udp://514 input exclusion</title>
      <link>https://community.splunk.com/t5/Alerting/udp-514-input-exclusion/m-p/556884#M10605</link>
      <description>&lt;P&gt;We have logs coming in udp port 514 and want to exclude indexing events with the field "action" equaling "accept". We have tried inserting the following into the inputs.conf but does not work.&lt;/P&gt;&lt;P&gt;blacklist = action = "accept"&lt;/P&gt;&lt;P&gt;Please assist.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 16:36:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/udp-514-input-exclusion/m-p/556884#M10605</guid>
      <dc:creator>joeybroesky</dc:creator>
      <dc:date>2021-06-23T16:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: udp://514 input exclusion</title>
      <link>https://community.splunk.com/t5/Alerting/udp-514-input-exclusion/m-p/556914#M10609</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/44020"&gt;@joeybroesky&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There seems no blacklist setting exist as per inputs conf -&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.2.0/Admin/Inputsconf#UDP:" target="_blank"&gt;inputs.conf - Splunk Documentation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You can send the events to nullQueue to avoid indexing apply the following conf on HF/indexer.&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;#props.conf
[your_udp_sourcetype/source::&amp;lt;source&amp;gt;/host::&amp;lt;hostname&amp;gt;]
TRANSFORMS-null= setnull
 
#transforms.conf
[setnull]
REGEX = action\s+=\s+\"accept\"
DEST_KEY = queue
FORMAT = nullQueue&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;----&lt;/P&gt;&lt;P&gt;An upvote would be appreciated and accept solution if it helps!&lt;/P&gt;&lt;DIV class="view-original-post-link"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 24 Jun 2021 00:47:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/udp-514-input-exclusion/m-p/556914#M10609</guid>
      <dc:creator>venkatasri</dc:creator>
      <dc:date>2021-06-24T00:47:21Z</dc:date>
    </item>
    <item>
      <title>Re: udp://514 input exclusion</title>
      <link>https://community.splunk.com/t5/Alerting/udp-514-input-exclusion/m-p/557234#M10615</link>
      <description>&lt;P&gt;Thanks for your help! This did exactly what I was looking for.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jun 2021 18:47:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/udp-514-input-exclusion/m-p/557234#M10615</guid>
      <dc:creator>joeybroesky</dc:creator>
      <dc:date>2021-06-25T18:47:17Z</dc:date>
    </item>
  </channel>
</rss>

