Splunk Enterprise

Problem with filtering in props and transforms files

AdrianV1_2
Loves-to-Learn

Good afternoon.

When filtering events before indexing there is something wrong, because for unknown reasons this filter is not being applied correctly and events are still being sent which should be discarded. The configuration I have in the props and transforms files is the following (this filter has been applied both locally, and in the default and local folders of the corresponding app)

 

[props]

[traffic] (This would be the sourcetype through which these events pass.)
TRANSFORMS-null= filter_to_null

 

[transforms]

[filter_to_null]
REGEX = (?:6|7)\.company.com\.es\s\d(?:[^,]*,){25}(?!53|389|3389|445|20|21|22|23|80|8443|8080|443)
DEST_KEY = queue
FORMAT = nullQueue

 

I have seen different forums but I can't find the problem and in principle the regex does work as it has been tested on different sites and on splunk itself.

Labels (2)
0 Karma

somesoni2
Revered Legend

Are you deploying these filter configurations to your Heavy forwarders/indexers (whichever is the Splunk Enterprise/Cloud instance that comes first in the data flow)? (and restarted Splunk)

0 Karma

AdrianV1_2
Loves-to-Learn

Yes, I am applying these settings on the HF with your subsequent splunk service restart.

0 Karma
Get Updates on the Splunk Community!

SOC4Kafka - New Kafka Connector Powered by OpenTelemetry

The new SOC4Kafka connector, built on OpenTelemetry, enables the collection of Kafka messages and forwards ...

Your Voice Matters! Help Us Shape the New Splunk Lantern Experience

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Building Momentum: Splunk Developer Program at .conf25

At Splunk, developers are at the heart of innovation. That’s why this year at .conf25, we officially launched ...