Getting Data In

Filtering out data (from a forwarder) on Indexer?

spunk311z
Path Finder

hi, i have several universal forwarders deployed, and im getting lots of events i want to filter out.

I understand from reading answers here i need to do this on the indexer (or else install heavy forwaders on my endpoints, which i dont want to do).
This is a raw entry that im trying to drop / filter out from my indexer (ie to keep it from using up lots of my license):

02/13/2020 10:19:09.016
event_status="(0)The operation completed successfully."
pid=1216
process_image="c:\Program Files\VMware\VMware Tools\vmtoolsd.exe"
registry_type="CreateKey"
key_path="HKLM\system\controlset001\services\tcpip\parameters"
data_type="REG_NONE"
data=""

This is the entry from the inputs.conf on the forwarders that is sending some of the events i want to filter out:

    [WinRegMon://default]
    disabled = 0
    hive = .*
    proc = .*
    type = rename|set|delete|create

And i have added these lines on my indexer (and restarted), but im still seeing the events come in:

#on props.conf ( located in: C:\Program #Files\Splunk\etc\users\admin\search\local\props.conf):

[WinRegMon://default]
TRANSFORMS-set= setnull

#on transforms.conf ( located in: C:\Program #Files\Splunk\etc\users\admin\search\local\transforms.conf):

[setnull]
REGEX = process_image=.+vmtoolsd.exe"
DEST_KEY = queue
FORMAT = nullQueue

Thanks!
(ive been referencing many answers, including this good one):
(h)ttps:// answers.splunk.com/answers/37423/how-to-configure-a-forwarder-to-filter-and-send-the-specific-events-i-want.html

0 Karma

spunk311z
Path Finder

I was able to fix this, the issue does not appear to be with my orginal regex (although Giuseppe's suggestion is better form than mine and is what i will be using),

it was that i was editing props.conf and transform.conf in:
$SPLUNK_BASE$\etc\users\admin\search\local\

as opposed to the proper location of:
$SPLUNK_BASE$\etc\system\local\

once i copied my stanzas over to that location, and refreshed, the entries in question stopped coming in!

Can anyone explain the difference between .conf files in these two locations, please?

(i am logging into splunk with splunk user: admin).
thanks!

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @spunk311z,
check the regex: = is a special char and must be escaped, try this

process_image\=\".*vmtoolsd\.exe\"

Ciao.
Giuseppe

0 Karma

spunk311z
Path Finder

Thanks, But the events are still coming in even with this in my transforms.conf:

[setnull]
REGEX = process_image\=\".*vmtoolsd\.exe\"
DEST_KEY = queue
FORMAT = nullQueue

(i had run my original regex through regex tester.com and got a full match, fwiw. same on yours too). tks
Have tried both reloading and restarting splunk server.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @spunk311z,
are you sure that "WinRegMon://default" is the sourcetype of the events to delete?
see them in Splunk.

It's correct to install Universal Forwarders on Endpoints, but have you any intermediate Heavy Forwarder between UFs and Indexers?

Ciao.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...