Getting Data In

Is it possible to filter the IIS logs to they do not forwarded status 200?

crsupportddc
Explorer

I configured the Advanced Logging log files on a Server to forwarder to Splunk.

This is the structure of the log files:

Fields: sitename date-UTC time-UTC date-local time-local Method cs-uri-stem cs-uri-query Username c-ip Status Substatus TimeTakenMS

But I want that it only forwarder the states different to 200. (Status <> 200). Someone knows, How can I do it?

Regards

0 Karma

dkeck
Influencer

HI,

you can blacklist your input on forwarder side.

Try something like:

inputs.conf
     [monitor://<your_path>] 
     blacklist = regex
     sourcetype = your sourcetype
     index = your index

How does your log look like? maybe you can set the regex to status=200 that could be it.

0 Karma

crsupportddc
Explorer

Hi dkeck, Thank you for your help,

I tried to make your suggestion, but it doesn't work.

I investigated and the black list in this way is for the file name, but the row that I don't want to forwarder is inside of the file , something like that

This is the W3C structure

Fields: sitename date-UTC time-UTC date-local time-local Method cs-uri-stem cs-uri-query Username c-ip Status Substatus TimeTakenMS

This is the field
"HOMEHOME" 2019-02-14 22:56:35.416 2019-02-14 16:56:35.416 GET /home/Mobile.WebSite/api/breeze/ - 99.99.9.999 200 0 224

Get Updates on the Splunk Community!

Splunk Enterprise Security(ES) 7.3 is approaching the end of support. Get ready for ...

Hi friends!    At Splunk, your product success is our top priority. With Enterprise Security (ES), we're here ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...