Splunk Search

Need help with nullQueue (specifics included)

echojacques
Builder

Hi everyone,

For a few days now I've been tweaking my props.conf, transforms.conf, and rebooting Splunk trying to exclude certain events from being indexed (nullQueue). I have included the stanzas in my props.conf, transforms.conf, and an example of an event that I am trying to exclude below. I'm hoping that someone can save me another week of tweaking and rebooting Splunk trying to get this nullQueue to work 🙂

My app-local-props.conf file contains:

[source::*opsec*]
TRANSFORMS-null:setnull

Note: I'm not sure if I identifed the source correctly, you can see the full long path in the example event I included below.

My app-local-transforms.conf file contains:

[setnull]
REGEX=(?m)^service=(80)
DEST_KEY=queue
FORMAT=nullQueue

What I'm trying to exclude:

Here's an example of one of the multi-line events that contain "service=80" that I'm trying to send to the nullQueue. I modified the original event to shorten the length and also changed the IP addresses. You can see "service=80" near the middle of the second line:

loc=12345|time=19Aug2013 14:44:28|action=drop|orig=10.10.10.10|i/f_dir=inbound|i/f_name=eth1-01|has_accounting=0|src=10.10.10.10|s_port=49528|dst=10.10.10.10|service=80|proto=tcp|message_info=Address spoofinghost=SPLUNK-01 | sourcetype=opsec | source=/data/splunk/etc/apps/Splunk_TA_opseclea_linux22/bin/lea-loggrabber.sh --configentity SplunkLEA

I've tried many different variations (at least 20) of the REGEX but nothing has worked so far. Any advice or guidance is very appreciated!!

Thanks

Tags (2)
0 Karma
1 Solution

echojacques
Builder

Hi everyone,

Splunk support found the problem: the quotes around "source=80". I changed my transforms.conf REGEX to:

[setnullopsec]
REGEX=service=80
DEST_KEY=queue
FORMAT=nullQueue

... and it worked!!! I had tried service=80 (without the quotes) before but I must have had a problem with my props.conf source stanza when I had tried it. I guess my source and REGEX were both slightly off.

Thanks for all the help!

View solution in original post

echojacques
Builder

Yes, it's all on the indexer (the Linux system that is running our Splunk). Yes, that's the exact source as it appears under "Sources" on the main Splunk search page. Maybe I should drop the "--configentity SplunkLEA" part which looks like a switch or a flag?

I was able to successfully exclude some windows events from the Splunk index last month so I know that the nullQueue works. Just can't get it to work for my opsec.

Also, I am modifying the files in the APP LOCAL directory, not in the APP DEFAULT directory. Hope this is correct.

0 Karma

Ayn
Legend

Also, apart from this - just to make sure - you are putting all this configuration on the indexer, not a forwarder, I hope.

0 Karma

Ayn
Legend

That source looks really weird, so it's very likely that it's not matching properly. Is that really the exact source you're getting for your opsec data in Splunk? For troubleshooting purposes I'd throw in a field extraction that is guaranteed to match something under the same stanza to see if it's being applied or not. That way you don't have to go restart Splunk to see if the stanza is being applied or not.

0 Karma

echojacques
Builder

Still not working... should I use quotes around the source in the props source instead of parens since it's a long source with hyphens?

0 Karma

echojacques
Builder

Ayn,
Thanks for the help. I used regexpal and modified my files as follows:

props.conf (modified source and fixed colon):

[source::(/data/splunk/etc/apps/Splunk_TA_opseclea_linux22/bin/lea-loggrabber.sh --configentity SplunkLEA)]
 TRANSFORMS-null=setnull

transforms.conf (simplified REGEX per regexpal):

[setnull]
REGEX=service=80
DEST_KEY=queue
FORMAT=nullQueue

I am rebooting Splunk right now and will let you know if it works!

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Unlocking Unified Insights: New Gigamon Federated Search App for Splunk

In today’s data-heavy environment, organizations are caught in a data distribution dilemma. As data volumes ...

GA: New Data Management App in Splunk Platform

Streamlining Data Management: Introducing a unified experience in Splunk Managing data at scale shouldn’t feel ...

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...