Knowledge Management

How to configure sc4s (Splunk connect for syslog SC4S) to drop certain events?

Elbald97
Explorer

Hello,

I have an Splunk Connect for Syslog (SC4S) server that retrieves logs from a source and transmits them to Splunk indexers.

But in order to reduce the number of events, I want to filter the logs at the sc4s level. Note that the sc4s tool uses syslog-ng for filtering and parsing.


The use case is as follows:
when an event arrives on the sc4s server and contains an ip address of 10.9.40.245, the event is dropped.

Elbald97_2-1734353403956.png

Does anyone have any idea how to create this filter on SC4S?

Thank you.

Labels (1)
0 Karma

Elbald97
Explorer

Thank you.

It's worked for me.

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...