<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using Regex We need to Capture Few Events with Conditions (High, Critical etc.) in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343643#M5351</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;

&lt;P&gt;We want to capture the logs which are coming with events and condition like "WARNING" OR "HIGH" OR "MEDIUM" OR "CRITICAL" and to filter out the logs which are coming with "INFORMATION" OR "VERBOSE" OR "MONITORABLE" OR "UNEXPECTED"&lt;/P&gt;</description>
    <pubDate>Mon, 12 Jun 2017 10:12:31 GMT</pubDate>
    <dc:creator>anandhalagarasa</dc:creator>
    <dc:date>2017-06-12T10:12:31Z</dc:date>
    <item>
      <title>Using Regex We need to Capture Few Events with Conditions (High, Critical etc.)</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343643#M5351</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;

&lt;P&gt;We want to capture the logs which are coming with events and condition like "WARNING" OR "HIGH" OR "MEDIUM" OR "CRITICAL" and to filter out the logs which are coming with "INFORMATION" OR "VERBOSE" OR "MONITORABLE" OR "UNEXPECTED"&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2017 10:12:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343643#M5351</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2017-06-12T10:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: Using Regex We need to Capture Few Events with Conditions (High, Critical etc.)</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343644#M5352</link>
      <description>&lt;P&gt;Hi anandhalagarasan,&lt;/P&gt;

&lt;P&gt;give this a try.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;props.conf

[yoursourcetpye]
TRANSFORMS-yoursourcetype=eliminate


transforms.conf

[eliminate]
REGEX=(?=Unexpected|Information|Verbose|Monitorable)
DEST_KEY=queue
FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Let me know if it works!&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2017 12:27:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343644#M5352</guid>
      <dc:creator>horsefez</dc:creator>
      <dc:date>2017-06-12T12:27:43Z</dc:date>
    </item>
    <item>
      <title>Re: Using Regex We need to Capture Few Events with Conditions (High, Critical etc.)</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343645#M5353</link>
      <description>&lt;P&gt;I have tried the same but the filtering is not working so kindly provide a solution for the same. &lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2017 06:34:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343645#M5353</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2017-06-13T06:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: Using Regex We need to Capture Few Events with Conditions (High, Critical etc.)</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343646#M5354</link>
      <description>&lt;P&gt;All events are once again reaching Splunk so kindly check and update the same.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2017 06:41:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343646#M5354</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2017-06-13T06:41:51Z</dc:date>
    </item>
    <item>
      <title>Re: Using Regex We need to Capture Few Events with Conditions (High, Critical etc.)</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343647#M5355</link>
      <description>&lt;P&gt;Can anyone help on this query.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2017 06:50:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343647#M5355</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2017-06-13T06:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: Using Regex We need to Capture Few Events with Conditions (High, Critical etc.)</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343648#M5356</link>
      <description>&lt;P&gt;I have to admit, that I was surprised my inital solution did not work as expected. &lt;BR /&gt;
Regardless of that I found a working solution.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;props.conf

[sharepoint]
TRANSFORMS-null = setnull

transforms.conf

[setnull]
REGEX = (?=Unexpected|Information|Verbose|Monitorable)
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This should work for you as well.&lt;BR /&gt;
Here is a link to helpful documentation about it:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/SplunkCloud/6.5.1/Forwarding/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest"&gt;http://docs.splunk.com/Documentation/SplunkCloud/6.5.1/Forwarding/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 16:12:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343648#M5356</guid>
      <dc:creator>horsefez</dc:creator>
      <dc:date>2017-06-16T16:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: Using Regex We need to Capture Few Events with Conditions (High, Critical etc.)</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343649#M5357</link>
      <description>&lt;P&gt;Thanks its working fine.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 09:41:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Regex-We-need-to-Capture-Few-Events-with-Conditions-High/m-p/343649#M5357</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2017-06-21T09:41:16Z</dc:date>
    </item>
  </channel>
</rss>

