All Apps and Add-ons

Routing events to null queue active directory dns debug

splunkranger
Path Finder

I need to drop all events that contain the string company.com for example below.

I would like to drop these events below.

This should work right?

Thank you

1674 PACKET UDP Snd 127.0.0.1 2d69 R Q [8081 DR NOERROR] A .redfish.company.com.
1674 PACKET UDP Snd 127.0.0.1 2d69 R Q [8081 DR NOERROR] A .https-proxy.company.com.

Props.conf

TRANSFORMS-drop = dropline
EXTRACT-dns_name = (?i)] \w+\s+(?P(.+))
SEDCMD-win_dns = s/(\d+)/./g
SEDCMD-domainname = s/(\(\d\))/./g

Transforms.conf

[dropline]
REGEX = company
DEST_KEY = queue
FORMAT = nullQueue

0 Karma

cygnetix
Path Finder

Hey splunkranger,

Try something like this in your props and transforms config files.

props.conf:

TRANSFORMS-null-dns1= company_com

transforms.conf:

[company_com]
REGEX = (?i:company\.com\.$)
DEST_KEY = queue
FORMAT = nullQueue

0 Karma

jcoates_splunk
Splunk Employee
Splunk Employee

I think so... has nothing to do with the Splunk Support for Active Directory though.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Keep the Learning Going with the New Best of .conf Hub

Hello Splunkers, With .conf26 getting closer, there’s already a lot of excitement building around this year’s ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

How to find the worst searches in your Splunk environment and how to fix them

Everyone knows Splunk is a powerful platform for running searches and doing data analytics. Your ...