Getting Data In

What is the easiest way to exclude ingestion of events for a specific IP address at UF OR SyslogNG level?

Nraj87
Explorer
Easiest way to exclude ingestion of events for a specific IP address from a SourceType at UF level OR Syslog-NG
 
Labels (1)
0 Karma

seemanshu
Path Finder

Hi @Nraj87 ,

You could use one of the following methods for excluding the data from a specific IP in your infrastructure,

  • Modifying syslog-ng.conf
    • filter f_all { not (<ip_address_to_be_excluded>);};
  • Modifying transforms.conf and props.conf

in transforms.conf                 

 

[setnull]
 REGEX = <regex for the ip to be excluded>
 DEST_KEY = queue
 FORMAT = nullQueue

 

 

  • in props.conf 

 

[sourcetype_name]
TRANSFORMS-null = setnull

 

Kindly support the answer, if find it useful.

Happy Splunking!

0 Karma

woodcock
Esteemed Legend

The "easiest way" is almost never the "right way".  The "right way" is almost always to drop it as early in the transmission pipeline as possible.  So if syslog-ng, then do it with an IP filter in syslog-ng.  The easy way is to drop it at the indexer, but I would never do it that way.

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Please be more specific about:

1) What your infrastructure and ingestion process looks like

2) What you want to do - filter out events coming from particuar IP? Containing particular IP? Something else?

0 Karma

Nraj87
Explorer

1) What your infrastructure and ingestion process looks like - All the network devices are sending logs to SYSLOG-NG and from SYSLOGNG UF is forwarding the logs to the Indexers.

2) What you want to do - filter out events coming from particular IP?  yes, i would like to filter out all the events at UF level particular IP.          Containing particular IP?NA Something else?NA

0 Karma

PickleRick
SplunkTrust
SplunkTrust

So the easiest thing to do would be to (in order of decreasing reasonableness):

1) Not send the events from that IP

2) Configure your syslog-ng to silently discard events from that IP

3) Configure iptables on your syslog-ng host to reject/drop syslog packets from that IP

It has nothing to do with UF itself. It should be done before the events even reach the UF.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...