Getting Data In

How to configure props.conf and/or transforms.conf to filter out events with a specific sourcetype?

Bill_B
Communicator

I am working on what should be a very easy filter, but cannot get it to work. I want to filter out events with sourcetype="WinEventLog:ForwardedEvents". This is my props and transforms in $SPLUNK_HOME/etc/system/local.

props.conf

[WinEventLog:ForwardedEvents]
TRANSFORMS-wmi=wminull


transforms.conf


[wminull]
REGEX= .
DEST_KEY=queue
FORMAT=nullQueue

Any help you can give me is very appreciated.

0 Karma

sbrant_splunk
Splunk Employee
Splunk Employee

Are you running Splunk on multiple servers? If so, your props and transforms files should reside on the indexer or on the heavy forwarder, if you're using one.

somesoni2
Revered Legend

I guess these configurations should be in heavy forwarder not on indexer. In case of universal forwarders it should be in indexers.

0 Karma

Bill_B
Communicator

Thanks. I'll check the spaces.
I have 2 indexers and several heavy forwarders. This particular config is on the main indexer which also serves as the search head.
Thanks for the help!

0 Karma

somesoni2
Revered Legend

Check the spaces between properties and "=" sign. It should be attribute_name (space) = (space) attribute_value. ALso a restart of splunk will be required (if not already doing)

Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...

Updated Data Management and AWS GDI Inventory in Splunk Observability

We’re making some changes to Data Management and Infrastructure Inventory for AWS. The Data Management page, ...