I've got a seemingly simple problem that I'm having a bit of difficulty on. I've been tasked with excluding log events containing a specific text string (in this case, an IP address) from being indexed in Splunk. I've done similar with sources such as Windows event logs (using props.conf and transforms.conf to send to nullQueue based on a regex), but the catch this time is that the event could come from any host, and be any sourcetype. Basically, "if any event comes into Splunk with this text string, send it to nullQueue." Any ideas?
Hello, You should be able to use the same method using your props.conf and transforms.conf. Except this time you will define a your transfrom under default stanza in your props.conf. The transform should be applied to all stanza in your props.conf.
TRANSFORMS-remove_events = ipremove
Hope this helps or gets you started. Dont forget to vote up and accept answers.
According to the docs for props.conf, you can set global settings under the stanza called
default instead of a source/sourcetype/host.
[default] TRANSFORMS-who_did_it = dunno
[dunno] REGEX = <insert your ip> DEST_KEY = queue FORMAT = nullQueue
I have never done this (and to be honest, it sounds a bit like someone wanting to cover his/her tracks :), but I can't see why it shouldn't work.