Getting Data In

Is there a option to ingest application logs for only one applicaiton(process) on teh windows servers?

kiran331
Builder

Hi

Is there a option to ingest the logs of only one process from the windows servers ignoring rest of the events?

0 Karma

maheshj
Explorer

Hi Kiran,
Yes it's possible to do while ingesting the data.
Configure the event-level transformations on the indexer.

  • If an event contains the regex pattern (? pattern), then index the event to index1.
  • If an event contains the regex pattern (?! pattern), then do not index.

Note pattern will be your windows process

transforms.conf
[eventsRoute]
REGEX= (? pattern)
DEST_KEY = _MetaData:Index
FORMAT = <index1>

[eventsDrop]
REGEX = (?! pattern)
DEST_KEY = queue
FORMAT = nullQueue

props.conf
[Yoursourcetype]
TRANSFORMS-­‐neglect = eventsDrop
TRANSFORMS-­‐ingest = eventsRoute

Regards,
Mahesh

DalJeanis
Legend

... with the small note that the pattern for eventsDrop could be .*, to send EVERYTHING to the nullQueue unless it was later overridden by matching the pattern for eventsRoute.

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...