Splunk Enterprise

Problem with filtering in props and transforms files

AdrianV1_2
Loves-to-Learn

Good afternoon.

When filtering events before indexing there is something wrong, because for unknown reasons this filter is not being applied correctly and events are still being sent which should be discarded. The configuration I have in the props and transforms files is the following (this filter has been applied both locally, and in the default and local folders of the corresponding app)

 

[props]

[traffic] (This would be the sourcetype through which these events pass.)
TRANSFORMS-null= filter_to_null

 

[transforms]

[filter_to_null]
REGEX = (?:6|7)\.company.com\.es\s\d(?:[^,]*,){25}(?!53|389|3389|445|20|21|22|23|80|8443|8080|443)
DEST_KEY = queue
FORMAT = nullQueue

 

I have seen different forums but I can't find the problem and in principle the regex does work as it has been tested on different sites and on splunk itself.

Labels (2)
0 Karma

somesoni2
Revered Legend

Are you deploying these filter configurations to your Heavy forwarders/indexers (whichever is the Splunk Enterprise/Cloud instance that comes first in the data flow)? (and restarted Splunk)

0 Karma

AdrianV1_2
Loves-to-Learn

Yes, I am applying these settings on the HF with your subsequent splunk service restart.

0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...