<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I use props.conf and transforms.conf to filter events based on a key word? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432254#M123503</link>
    <description>&lt;P&gt;So it is working now?&lt;/P&gt;</description>
    <pubDate>Wed, 30 Jan 2019 00:50:24 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2019-01-30T00:50:24Z</dc:date>
    <item>
      <title>How do I use props.conf and transforms.conf to filter events based on a key word?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432249#M123498</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;I have a lot of compressed files in a local directory that I want Splunk to ingest.&lt;/P&gt;

&lt;P&gt;I set up a directory as an input via the WebUI, but I only want events that contain a key word like "usasite.com"&lt;/P&gt;

&lt;P&gt;The raw data is in JSON format and the majority of the data is similar having the following pattern like this: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;.................,"requestBody":"{\"siteId\":\"usasite.com\",\"data\":{\............
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I want to filter and drop events that don't have usasite.com in the raw data.&lt;/P&gt;

&lt;P&gt;I created props and transforms in system/local using a test source&lt;/P&gt;

&lt;P&gt;I place a couple files in the dir /data/test_files... one file has usasite.com and the other file does not.&lt;/P&gt;

&lt;P&gt;Props.conf&lt;BR /&gt;
[source::/data/test_files]&lt;BR /&gt;
TRANSFORMS-set = setnull, setparsing&lt;/P&gt;

&lt;P&gt;Transforms.conf&lt;BR /&gt;
[setnull]&lt;BR /&gt;
REGEX = .&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;[setparsing]&lt;BR /&gt;
REGEX =usasite.com&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = indexQueue&lt;/P&gt;

&lt;P&gt;But I cannot get the filter to work... Splunk grabs both files.&lt;/P&gt;

&lt;P&gt;I feel I must not be setting up the regex correctly.&lt;/P&gt;

&lt;P&gt;Any advice appreciated.&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jan 2019 21:44:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432249#M123498</guid>
      <dc:creator>Log_wrangler</dc:creator>
      <dc:date>2019-01-29T21:44:11Z</dc:date>
    </item>
    <item>
      <title>Re: How do I use props.conf and transforms.conf to filter events based on a key word?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432250#M123499</link>
      <description>&lt;P&gt;What you have done looks correct. However make sure you put these files on the indexers or on the heavy forwarder if the data is going through a hf.&lt;/P&gt;

&lt;P&gt;This null queuing does not happen on the UF.&lt;/P&gt;

&lt;P&gt;Good luck&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jan 2019 21:49:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432250#M123499</guid>
      <dc:creator>chrisyounger</dc:creator>
      <dc:date>2019-01-29T21:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: How do I use props.conf and transforms.conf to filter events based on a key word?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432251#M123500</link>
      <description>&lt;P&gt;You need to deploy this to the UF if you are using &lt;CODE&gt;INDEXED_EXTRACTIONS&lt;/CODE&gt; or to the HFs or Indexers otherwise.  You need to restart all Splunk instances there.  You must only check events that were forwarded AFTER the restart.  If you have done a sourcetype value override, you must use the ORIGINAL sourcetype value in &lt;CODE&gt;props.conf&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jan 2019 22:21:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432251#M123500</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-01-29T22:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: How do I use props.conf and transforms.conf to filter events based on a key word?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432252#M123501</link>
      <description>&lt;P&gt;thx for the feed back its actually on a standalone 7.1 ec2 instance.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jan 2019 22:25:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432252#M123501</guid>
      <dc:creator>Log_wrangler</dc:creator>
      <dc:date>2019-01-29T22:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: How do I use props.conf and transforms.conf to filter events based on a key word?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432253#M123502</link>
      <description>&lt;P&gt;Sorry I did not mention earlier, this is a standalone 7.1 ec2 that I am using for an emergency ingestion situation.   I have not setup the production data I need yet, only testing with a test_files dir so far... and no luck.&lt;/P&gt;

&lt;P&gt;So to recap, I have a lot of .gz files in /data   and I want to ingest them but drop any event that does not have usasite.com in it.   Not sure if that is possible.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jan 2019 22:29:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432253#M123502</guid>
      <dc:creator>Log_wrangler</dc:creator>
      <dc:date>2019-01-29T22:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: How do I use props.conf and transforms.conf to filter events based on a key word?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432254#M123503</link>
      <description>&lt;P&gt;So it is working now?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jan 2019 00:50:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-use-props-conf-and-transforms-conf-to-filter-events/m-p/432254#M123503</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-01-30T00:50:24Z</dc:date>
    </item>
  </channel>
</rss>

