Alerting

udp://514 input exclusion

joeybroesky
Path Finder

We have logs coming in udp port 514 and want to exclude indexing events with the field "action" equaling "accept". We have tried inserting the following into the inputs.conf but does not work.

blacklist = action = "accept"

Please assist.

Labels (1)
Tags (2)
0 Karma
1 Solution

venkatasri
SplunkTrust
SplunkTrust

Hi @joeybroesky 

There seems no blacklist setting exist as per inputs conf - inputs.conf - Splunk Documentation

You can send the events to nullQueue to avoid indexing apply the following conf on HF/indexer. 

#props.conf
[your_udp_sourcetype/source::<source>/host::<hostname>]
TRANSFORMS-null= setnull
 
#transforms.conf
[setnull]
REGEX = action\s+=\s+\"accept\"
DEST_KEY = queue
FORMAT = nullQueue

 ----

An upvote would be appreciated and accept solution if it helps!

 

View solution in original post

venkatasri
SplunkTrust
SplunkTrust

Hi @joeybroesky 

There seems no blacklist setting exist as per inputs conf - inputs.conf - Splunk Documentation

You can send the events to nullQueue to avoid indexing apply the following conf on HF/indexer. 

#props.conf
[your_udp_sourcetype/source::<source>/host::<hostname>]
TRANSFORMS-null= setnull
 
#transforms.conf
[setnull]
REGEX = action\s+=\s+\"accept\"
DEST_KEY = queue
FORMAT = nullQueue

 ----

An upvote would be appreciated and accept solution if it helps!

 

joeybroesky
Path Finder

Thanks for your help! This did exactly what I was looking for.

0 Karma
Get Updates on the Splunk Community!

Introducing Ingest Actions: Filter, Mask, Route, Repeat

WATCH NOW Ingest Actions (IA) is the best new way to easily filter, mask and route your data in Splunk® ...

Splunk Forwarders and Forced Time Based Load Balancing

Splunk customers use universal forwarders to collect and send data to Splunk. A universal forwarder can send ...

NEW! Log Views in Splunk Observability Dashboards Gives Context From a Single Page

Today, Splunk Observability releases log views, a new feature for users to add their logs data from Splunk Log ...