I’m trying to get our AIX data into Splunk, but I’m having a filter/nullQueue issue. I was wanting to keep certain events and nullQueue everything else. Below is the props and transform. Right now everything is going into the index. Am I going about this the wrong way? The filtering is done on a heavy forwarder.
props.conf
[AIX]
TRANSFORMS-sec=sec_keepevent,sec_nullqueue
transforms.conf
[sec_keepevent]
REGEX = (sshd\[\d*\]:)|( su:)|( sudo:)|( failed:)
DEST_KEY = queue
FORMAT = indexQueue
[sec_nullqueue]
REGEX = (.*)
DEST_KEY = queue
FORMAT = nullQueue
Hi,
Yes you are going about it in the wrong way - literally 🙂
You need to change the order in which the transforms are called from props.conf.
TRANSFORMS-sec = sec_nullqueue, sec_keepevents
The transforming takes the events through all transforms before returning them for further processing/indexing. Thus the nullQueue
must come first.
lguinn might be right on the REGEX, though.
/k
And make sure that you're doing it under the correct props.conf stanza. Anything under [AIX]
will only match if the sourcetype is called AIX
.
You might also want to take a look here;
http://wiki.splunk.com/Where_do_I_configure_my_Splunk_settings
since with your current config, if it was in the right place, all events would be discarded.
Also, these changes only apply to incoming traffic, it will not alter existing events in an index.
/k
Try this for the regular expression in seckeepevent
REGEX = (sshd\[\d*\]:|su:|sudo:|failed:)