Getting Data In

How to filter event on splunk heavy forwarder?

anapat
New Member

I setup splunk heavy forwarder and splunk indexer.

I want to filter some event before indexed on splunk indexer.

*** Example log, i want to filter

2011-02-05 00:02:00,018 INFO [Cron_SendFaxNTF] - <BEGIN Send Notification Fax...>
2011-02-05 00:02:00,034 INFO [Cron_SendFaxNTF] - <BEGIN Send Notifications...>

I try to config both indexer and forwarder but not work!!!

*** props.conf

[iCIS_log]
TRANSFORMS-icisLog = icisLog-null

*** transforms.conf

[icisLog-null]
REGEX = ^\d+-\d+-\d+\s\d+:\d+:\d+,\d+\sINFO.*
DEST_KEY = queue
FORMAT = nullQueue

Help me please !!!!

Tags (3)
0 Karma

ftk
Motivator

In your inputs.conf, do you have your monitor set to the correct sourcetype (iCIS_log)?

Possibly tune your REGEX as such: ^\d{4}-\d{2}-\d{2}\s+\d{2}:\d{2}:\d{2},\d{3}\s+INFO

0 Karma

anapat
New Member

Yes, I monitor sourcetype "iCIS log" and try to config both indexer and forwarder

I'll test with your regex. And i'll update result later.

0 Karma
Get Updates on the Splunk Community!

Update Your SOAR Apps for Python 3.13: What Community Developers Need to Know

To Community SOAR App Developers - we're reaching out with an important update regarding Python 3.9's ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Automatic Discovery Part 2: Setup and Best Practices

In Part 1 of this series, we covered what Automatic Discovery is and why it’s critical for observability at ...