Splunk Cloud Platform

How to exclude events with specific rule in PAN Traffic?

govindaraja123
New Member

In PAN tarffic, where we are trying to exclude events with "block-untst-rule" string. PAN traffic logs are configured to receive in syslog server. I tried to use filter in syslog-ng config as shown below. 

filter exclogs { not match("block\\-untst\\-rule"); };

log {source(s_syslog_pa_cloud); filter {exclogs}; destination(d_syslog_pa_cloud); };

Other way we tried is by using props.conf and transforms.conf

props.conf
[pan:traffic]
TRANSFORMS-set = setnull

transforms.conf
[setnull]
REGEX = block\\-untst\\-rule
DEST_KEY = queue
FORMAT = nullQueue

Both ways we are not able to exclude the events from ingesting. Please do assist.

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

The escape characters in the regular expressions are not necessary.  Using double escape characters tells Splunk to expect a backslash in the data, which probably is not the case.

[setnull]
REGEX = block-untst-rule
DEST_KEY = queue
FORMAT = nullQueue
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...