Splunk Enterprise

How to filter certain logs on forwarder with certain key words or KV pairs in inputs.conf

nevinas
New Member

How do we filter certain logs on HF using inputs.conf

Tried the below 2 ways but no luck.

---------------------------------------------------------
 
[monitor:///syslog/cisco/ios/]
 
blacklist = IME_ID = "*"
blacklist1 = TCA_ID = "*"
 
 
-------------------------------------------------------------
 
[monitor:///syslog/cisco/ios/]

blacklist2="DOMAIN-2-IME_DETAILS"
blacklist3 = "DOMAIN-2-IME_DETAILS"

 

Labels (2)
0 Karma

to4kawa
Ultra Champion
blacklist = <regular expression>
* If set, files from this input are NOT monitored if their path matches the
  specified regex.

https://docs.splunk.com/Documentation/Splunk/8.0.5/Admin/Inputsconf

maybe, you need transforms.conf setting.

0 Karma
Get Updates on the Splunk Community!

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...

Splunk App Dev Community Updates – What’s New and What’s Next

Welcome to your go-to roundup of everything happening in the Splunk App Dev Community! Whether you're building ...

The Latest Cisco Integrations With Splunk Platform!

Join us for an exciting tech talk where we’ll explore the latest integrations in Cisco &#43; Splunk! We’ve ...