Hi A recent agent install across our infrastructure has created a flood in the proxy logs of blocked messages which is blowing out our license. Until there is a proper fix I need to stop ingesting events related to 1 URL. I think I just need help with the REGEX part. Log are dropped to a syslog server running a heavy forwarder, then we run a monitor on that log file. Inputs.conf [monitor:///remotesyslogs/mgmt-austaiaecho00*/*.log]
disabled = false
index = star_proxy
sourcetype = cisco:wsa:squid props.conf [cisco:wsa:squid]
TRANSFORMS-screen=eliminate-screenconnect transforms.conf [eliminate-screenconnect]
REGEX = ?.=screenconnect
DEST_KEYi = queue
FORMAT = nullQueue Example event from log file: 2020-06-12T04:04:55+10:00 mgmt-austaiaecho005.casino.internal accesslogs_splunk: Info: 1591898695.320 0 10.10.216.100 TCP_DENIED/407 0 CONNECT tunnel://screenconnect.techmedia.com.au:8080/ - NONE/- - OTHER-NONE-DefaultGroup-NONE-NONE-NONE-NONE <-,-,-,"-",-,-,-,-,"-",-,-,-,"-",-,-,"-","-",-,-,-,-,"-","-","-","-","-","-",0.00,0,-,"-","-",-,"-",-,-,"-","-",-,-,"-"> - - "12/Jun/2020:04:04:55 +1000" - Basically for next 4 weeks I need to drop all events with screenconnect.techmedia.com.au Thanks Mark
... View more