Quantcast
Channel: Questions in topic: "splunk-enterprise"
Viewing all articles
Browse latest Browse all 47296

Windows DNS Drop line via nullQueue not working

$
0
0
I'm trying to drop DNS requests for internal names from our windows DNS logs. For a guide I am using an answer from this question: https://answers.splunk.com/answers/35259/best-method-for-pulling-microsoft-dns-logs-with-splunk.html We have two TLDs I'd like to filter out, for example bob.local and fred.local I've added the following to my props.conf: [win_dns] TRANSFORMS-drop = win_dns_ignorelogs And the following to my transforms.conf [win_dns_ignorelogs] REGEX =(?i)\.*(bob|fred)\.local DEST_KEY = queue FORMAT = nullQueue And restarted Splunk. One thing to note is that we have a SED command in the props.conf which replaces the standard formatting of the records from something like this: 13/12/2015 9:29:58 AM 0678 PACKET 0000000001FE2D10 TCP Rcv 127.0.0.1 4a3f Q [0001 D NOERROR] NS (8)bob(3)local(0) To something like this: 13/12/2015 9:29:58 AM 0678 PACKET 0000000001FE2D10 TDP Rcv 127.0.0.1 4a3f Q [0001 D NOERROR] NS bob.local Via and entry in the props.conf like this: [source::win_dns] SEDCMD-DNSZones1 = s/\s\(.{1,4}\)// s/\(.{1,4}\)$// s/\(.{1,4}\)/./g When I test the regex in search like this: sourcetype=win_dns questionName="bob.local" | regex _raw="(?i)\.*(bob|fred)\.local" It matches the events I am expecting to drop. But the events are still being indexed. Can someone please help me out?

Viewing all articles
Browse latest Browse all 47296

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>