Splunk Enterprise

How to filter certain logs on forwarder with certain key words or KV pairs in inputs.conf

nevinas
New Member

How do we filter certain logs on HF using inputs.conf

Tried the below 2 ways but no luck.

---------------------------------------------------------
 
[monitor:///syslog/cisco/ios/]
 
blacklist = IME_ID = "*"
blacklist1 = TCA_ID = "*"
 
 
-------------------------------------------------------------
 
[monitor:///syslog/cisco/ios/]

blacklist2="DOMAIN-2-IME_DETAILS"
blacklist3 = "DOMAIN-2-IME_DETAILS"

 

Labels (2)
0 Karma

to4kawa
Ultra Champion
blacklist = <regular expression>
* If set, files from this input are NOT monitored if their path matches the
  specified regex.

https://docs.splunk.com/Documentation/Splunk/8.0.5/Admin/Inputsconf

maybe, you need transforms.conf setting.

0 Karma
Get Updates on the Splunk Community!

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureOn Demand Now Step boldly into the AI revolution with enhanced security ...

Enterprise Security Content Update (ESCU) | New Releases

In March, the Splunk Threat Research Team had 2 releases of security content via the Enterprise Security ...

Join the Splunk Developer Program Hackathon: Splunk Build-a-thon!

The Splunk Developer Program is launching in beta, and we’re celebrating with an exciting hackathon! This is ...