All Apps and Add-ons

Routing events to null queue active directory dns debug

splunkranger
Path Finder

I need to drop all events that contain the string company.com for example below.

I would like to drop these events below.

This should work right?

Thank you

1674 PACKET UDP Snd 127.0.0.1 2d69 R Q [8081 DR NOERROR] A .redfish.company.com.
1674 PACKET UDP Snd 127.0.0.1 2d69 R Q [8081 DR NOERROR] A .https-proxy.company.com.

Props.conf

TRANSFORMS-drop = dropline
EXTRACT-dns_name = (?i)] \w+\s+(?P(.+))
SEDCMD-win_dns = s/(\d+)/./g
SEDCMD-domainname = s/(\(\d\))/./g

Transforms.conf

[dropline]
REGEX = company
DEST_KEY = queue
FORMAT = nullQueue

0 Karma

cygnetix
Path Finder

Hey splunkranger,

Try something like this in your props and transforms config files.

props.conf:

TRANSFORMS-null-dns1= company_com

transforms.conf:

[company_com]
REGEX = (?i:company\.com\.$)
DEST_KEY = queue
FORMAT = nullQueue

0 Karma

jcoates_splunk
Splunk Employee
Splunk Employee

I think so... has nothing to do with the Splunk Support for Active Directory though.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...