Hi @joeybroesky
There seems no blacklist setting exist as per inputs conf - inputs.conf - Splunk Documentation
You can send the events to nullQueue to avoid indexing apply the following conf on HF/indexer.
#props.conf
[your_udp_sourcetype/source::<source>/host::<hostname>]
TRANSFORMS-null= setnull
#transforms.conf
[setnull]
REGEX = action\s+=\s+\"accept\"
DEST_KEY = queue
FORMAT = nullQueue
----
An upvote would be appreciated and accept solution if it helps!
Hi @joeybroesky
There seems no blacklist setting exist as per inputs conf - inputs.conf - Splunk Documentation
You can send the events to nullQueue to avoid indexing apply the following conf on HF/indexer.
#props.conf
[your_udp_sourcetype/source::<source>/host::<hostname>]
TRANSFORMS-null= setnull
#transforms.conf
[setnull]
REGEX = action\s+=\s+\"accept\"
DEST_KEY = queue
FORMAT = nullQueue
----
An upvote would be appreciated and accept solution if it helps!
Thanks for your help! This did exactly what I was looking for.