Splunk Cloud Platform

How to exclude events with specific rule in PAN Traffic?

govindaraja123
New Member

In PAN tarffic, where we are trying to exclude events with "block-untst-rule" string. PAN traffic logs are configured to receive in syslog server. I tried to use filter in syslog-ng config as shown below. 

filter exclogs { not match("block\\-untst\\-rule"); };

log {source(s_syslog_pa_cloud); filter {exclogs}; destination(d_syslog_pa_cloud); };

Other way we tried is by using props.conf and transforms.conf

props.conf
[pan:traffic]
TRANSFORMS-set = setnull

transforms.conf
[setnull]
REGEX = block\\-untst\\-rule
DEST_KEY = queue
FORMAT = nullQueue

Both ways we are not able to exclude the events from ingesting. Please do assist.

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

The escape characters in the regular expressions are not necessary.  Using double escape characters tells Splunk to expect a backslash in the data, which probably is not the case.

[setnull]
REGEX = block-untst-rule
DEST_KEY = queue
FORMAT = nullQueue
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...

Cloud Platform & Enterprise: Classic Dashboard Export Feature Deprecation

As of Splunk Cloud Platform 9.3.2408 and Splunk Enterprise 9.4, classic dashboard export features are now ...