Knowledge Management

How to configure sc4s (Splunk connect for syslog SC4S) to drop certain events?

Elbald97
Explorer

Hello,

I have an Splunk Connect for Syslog (SC4S) server that retrieves logs from a source and transmits them to Splunk indexers.

But in order to reduce the number of events, I want to filter the logs at the sc4s level. Note that the sc4s tool uses syslog-ng for filtering and parsing.


The use case is as follows:
when an event arrives on the sc4s server and contains an ip address of 10.9.40.245, the event is dropped.

Elbald97_2-1734353403956.png

Does anyone have any idea how to create this filter on SC4S?

Thank you.

Labels (1)
0 Karma

Elbald97
Explorer

Thank you.

It's worked for me.

0 Karma
Get Updates on the Splunk Community!

CX Day is Coming!

Customer Experience (CX) Day is on October 7th!! We're so excited to bring back another day full of wonderful ...

Strengthen Your Future: A Look Back at Splunk 10 Innovations and .conf25 Highlights!

The Big One: Splunk 10 is Here!  The moment many of you have been waiting for has arrived! We are thrilled to ...

Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console

Today, we’re excited to announce the release of a brand new AI assistant usage dashboard in Cloud Monitoring ...