Splunk Enterprise

How to filter certain logs on forwarder with certain key words or KV pairs in inputs.conf

nevinas
New Member

How do we filter certain logs on HF using inputs.conf

Tried the below 2 ways but no luck.

---------------------------------------------------------
 
[monitor:///syslog/cisco/ios/]
 
blacklist = IME_ID = "*"
blacklist1 = TCA_ID = "*"
 
 
-------------------------------------------------------------
 
[monitor:///syslog/cisco/ios/]

blacklist2="DOMAIN-2-IME_DETAILS"
blacklist3 = "DOMAIN-2-IME_DETAILS"

 

Labels (3)
0 Karma

to4kawa
Ultra Champion
blacklist = <regular expression>
* If set, files from this input are NOT monitored if their path matches the
  specified regex.

https://docs.splunk.com/Documentation/Splunk/8.0.5/Admin/Inputsconf

maybe, you need transforms.conf setting.

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.0.2 Availability: On cloud and On-premise!

A few months ago, we released Splunk Enterprise Security 8.0 for our cloud customers. Today, we are excited to ...

Logs to Metrics

Logs and Metrics Logs are generally unstructured text or structured events emitted by applications and written ...

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...