Getting Data In

Heavy Forwarders - possible to filter dynamically?

justjosh
Explorer

I need to filter events when they contain an id from a defined set.

I know that Heavy Forwarders can filter events based on a regex, but since my list of identifiers changes each day I will need to frequently update the configuration file containing the regex and then restart the forwarder to pick up the change.

Is there a more dynamic way to filter events or is using a regex the only option?

bjoernjensen
Contributor

Hi,

one approach could be the following: Create a file named filter.txt which contains all your filter strings. Next, define a new data input > file, for that file. Here, each line consists of a filter string:

foo
bar

(make sure the whole file is beeing monitored as one event)

After this you could use join() to filter. E.g. like this:

index="your_source_index" | join your_filter_field [search index="your_metaData_index" | head 1 | rex max_match=0 "(?<your_filter_field>.+)" | mvexpand your_filter_field | table your_filter_field]

I am also quite certain inputlookup will work. It does. You have to add a new lookup file and lookup. Moreover you have to update that lookup file on your server in some way. A search could look like this:

index="your_source_index" | join your_filter_field [ inputlookup your_lookup | rename csv_header AS your_filter_field]

Latter solution has the back draw of getting access to the lookup file.

0 Karma

bjoernjensen
Contributor

I see.

One little note: You can enable configurations changes made to transforms.conf by typing the following search in Splunk Web: "| extract reload=t"
(source: documentation of transform.conf).

Since you are writing:
"(...) then restart the forwarder to pick up the change."

justjosh
Explorer

Thanks for the suggestion - however this is applying filtering at search time. For performance reasons I need to filter out events so they are not sent to the index.

0 Karma
Get Updates on the Splunk Community!

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...

Detecting Remote Code Executions With the Splunk Threat Research Team

WATCH NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If exploited, ...

Enter the Dashboard Challenge and Watch the .conf24 Global Broadcast!

The Splunk Community Dashboard Challenge is still happening, and it's not too late to enter for the week of ...