Getting Data In

How to configure props.conf and/or transforms.conf to filter out events with a specific sourcetype?

Bill_B
Communicator

I am working on what should be a very easy filter, but cannot get it to work. I want to filter out events with sourcetype="WinEventLog:ForwardedEvents". This is my props and transforms in $SPLUNK_HOME/etc/system/local.

props.conf

[WinEventLog:ForwardedEvents]
TRANSFORMS-wmi=wminull


transforms.conf


[wminull]
REGEX= .
DEST_KEY=queue
FORMAT=nullQueue

Any help you can give me is very appreciated.

0 Karma

sbrant_splunk
Splunk Employee
Splunk Employee

Are you running Splunk on multiple servers? If so, your props and transforms files should reside on the indexer or on the heavy forwarder, if you're using one.

somesoni2
Revered Legend

I guess these configurations should be in heavy forwarder not on indexer. In case of universal forwarders it should be in indexers.

0 Karma

Bill_B
Communicator

Thanks. I'll check the spaces.
I have 2 indexers and several heavy forwarders. This particular config is on the main indexer which also serves as the search head.
Thanks for the help!

0 Karma

somesoni2
Revered Legend

Check the spaces between properties and "=" sign. It should be attribute_name (space) = (space) attribute_value. ALso a restart of splunk will be required (if not already doing)

Get Updates on the Splunk Community!

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had 3 releases of new security content via the Enterprise Security ...

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...