Splunk Enterprise

Problem with filtering in props and transforms files

AdrianV1_2
Loves-to-Learn

Good afternoon.

When filtering events before indexing there is something wrong, because for unknown reasons this filter is not being applied correctly and events are still being sent which should be discarded. The configuration I have in the props and transforms files is the following (this filter has been applied both locally, and in the default and local folders of the corresponding app)

 

[props]

[traffic] (This would be the sourcetype through which these events pass.)
TRANSFORMS-null= filter_to_null

 

[transforms]

[filter_to_null]
REGEX = (?:6|7)\.company.com\.es\s\d(?:[^,]*,){25}(?!53|389|3389|445|20|21|22|23|80|8443|8080|443)
DEST_KEY = queue
FORMAT = nullQueue

 

I have seen different forums but I can't find the problem and in principle the regex does work as it has been tested on different sites and on splunk itself.

Labels (2)
0 Karma

somesoni2
Revered Legend

Are you deploying these filter configurations to your Heavy forwarders/indexers (whichever is the Splunk Enterprise/Cloud instance that comes first in the data flow)? (and restarted Splunk)

0 Karma

AdrianV1_2
Loves-to-Learn

Yes, I am applying these settings on the HF with your subsequent splunk service restart.

0 Karma
Get Updates on the Splunk Community!

CX Day is Coming!

Customer Experience (CX) Day is on October 7th!! We're so excited to bring back another day full of wonderful ...

Strengthen Your Future: A Look Back at Splunk 10 Innovations and .conf25 Highlights!

The Big One: Splunk 10 is Here!  The moment many of you have been waiting for has arrived! We are thrilled to ...

Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console

Today, we’re excited to announce the release of a brand new AI assistant usage dashboard in Cloud Monitoring ...