<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Event filter in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158016#M32024</link>
    <description>&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;After all, the question is that with this configuration I can't filter events 200.&lt;/P&gt;</description>
    <pubDate>Wed, 27 Nov 2013 14:33:52 GMT</pubDate>
    <dc:creator>jmallorquin</dc:creator>
    <dc:date>2013-11-27T14:33:52Z</dc:date>
    <item>
      <title>Event filter</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158012#M32020</link>
      <description>&lt;P&gt;Hi to minimize the size of a index I would like to filter events for status 200&lt;/P&gt;

&lt;P&gt;This is my config files:&lt;/P&gt;

&lt;P&gt;inputs.conf&lt;BR /&gt;
[monitor://C:\Logs*.log]&lt;BR /&gt;
disabled = false&lt;BR /&gt;
followTail = 0&lt;BR /&gt;
host = CACA&lt;BR /&gt;
index = basura&lt;BR /&gt;
sourcetype = webexchange&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[webexchange]
TRANSFORMS-set= descartar
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[descartar]
REGEX = (?i)^(?:[^\.]*\.){8}\d+\s+(200)
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;events:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2013-07-13 23:59:59 W3SVC1 222.222.222.222 HEAD /OAB/4abc7b21-fb88-473a-acfc-83660b79ff57/oab.xml - 443 - 172.26.12.166 Microsoft+BITS/7.5 401 2 2148074254

2013-07-14 00:00:00 W3SVC1 333.333.333.333 POST /Microsoft-Server-ActiveSync/default.eas Cmd=Sync&amp;amp;User=xxxxxxxxxxxx&amp;amp;DeviceId=SEC1DCF083B0E526&amp;amp;DeviceType=SAMSUNGGTI9300&amp;amp;Log=V121_Fc1_Fid:8_Ty:Co_Filt0_St:S_Sk:1918965444_Sst9_LdapC0_LdapL0_RpcC21_RpcL31_Ers1_Pk3820395887_S1_ 443 xxxxxxx\xxxxxxxx 222.222.222.222 xxxxxxxxxxxxx/100.40102 200 0 0

2013-07-14 00:00:44 W3SVC1 333.333.333.333 POST /Microsoft-Server-ActiveSync/default.eas Cmd=FolderSync&amp;amp;User=xxxxxxxxxxxxx&amp;amp;DeviceId=SAMSUNG11091299461&amp;amp;DeviceType=SAMSUNGGTI9100&amp;amp;Log=V121_St:S_LdapC0_LdapL0_RpcC16_RpcL46_Pk3430192398_ 443 xxxxxxxx/xxxxxxx 222.222.2222.222 xxxxxxxxxxxxxxxxx/100.40102 200 0 0
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 27 Nov 2013 11:39:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158012#M32020</guid>
      <dc:creator>jmallorquin</dc:creator>
      <dc:date>2013-11-27T11:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: Event filter</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158013#M32021</link>
      <description>&lt;P&gt;Do you have a question?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2013 14:00:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158013#M32021</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2013-11-27T14:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: Event filter</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158014#M32022</link>
      <description>&lt;P&gt;This is done by defining a regex to match the necessary event(s) and send everything else to nullqueue&lt;/P&gt;

&lt;P&gt;Here is a basic example that will drop everything except events that contain the string login&lt;BR /&gt;
In props.conf:&lt;/P&gt;

&lt;P&gt;[source::/var/log/foo]&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;Transforms must be applied in this&lt;BR /&gt;
order  to make sure events are dropped&lt;BR /&gt;
on the floor prior to making their way&lt;BR /&gt;
to the index processor&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;TRANSFORMS-set= setnull,setparsing&lt;BR /&gt;
In transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX = login
DEST_KEY = queue
FORMAT = indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 27 Nov 2013 14:12:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158014#M32022</guid>
      <dc:creator>royimad</dc:creator>
      <dc:date>2013-11-27T14:12:51Z</dc:date>
    </item>
    <item>
      <title>Re: Event filter</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158015#M32023</link>
      <description>&lt;P&gt;That seems like a very complicated (and possibly error-prone) regex for finding the events you want to filter out. Since the end of the message is much more predictable, it seems more convenient to anchor the regex there. Suggestion;&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[webexchange]
TRANSFORMS-set= descartar
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[descartar]
REGEX = \s200\s\d+\s\d+$
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2013 14:29:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158015#M32023</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-11-27T14:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: Event filter</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158016#M32024</link>
      <description>&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;After all, the question is that with this configuration I can't filter events 200.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2013 14:33:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158016#M32024</guid>
      <dc:creator>jmallorquin</dc:creator>
      <dc:date>2013-11-27T14:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: Event filter</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158017#M32025</link>
      <description>&lt;P&gt;I did not see it as a question, either. And while your configuration (read: the regex) might work fine now, it is far safer to use the one I suggested below. Counting sequences of "non-dots followed by a dot" can break if there is an extra dot somewhere in an event, prior to the status code.&lt;/P&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2013 14:41:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158017#M32025</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-11-27T14:41:35Z</dc:date>
    </item>
    <item>
      <title>Re: Event filter</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158018#M32026</link>
      <description>&lt;P&gt;Using my configuration and just changing the regex that you provided still doesn't work the filter with the events that I posted.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2013 14:46:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158018#M32026</guid>
      <dc:creator>jmallorquin</dc:creator>
      <dc:date>2013-11-27T14:46:21Z</dc:date>
    </item>
    <item>
      <title>Re: Event filter</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158019#M32027</link>
      <description>&lt;P&gt;Are you making the configurations in the correct file/on the correct host?&lt;/P&gt;

&lt;P&gt;&lt;A href="http://wiki.splunk.com/Where_do_I_configure_my_Splunk_settings"&gt;http://wiki.splunk.com/Where_do_I_configure_my_Splunk_settings&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2013 15:17:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158019#M32027</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-11-27T15:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: Event filter</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158020#M32028</link>
      <description>&lt;P&gt;The filter will not affect events that have already been indexed, and the configs should be on the indexer or heavy forwarder that is doing the indexing.  If you put the configs on the universal forwarder it will not work.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2013 15:32:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158020#M32028</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-11-27T15:32:25Z</dc:date>
    </item>
    <item>
      <title>Re: Event filter</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158021#M32029</link>
      <description>&lt;P&gt;good point, forgot to mention the 'only affects new events' part.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2013 15:38:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Event-filter/m-p/158021#M32029</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-11-27T15:38:20Z</dc:date>
    </item>
  </channel>
</rss>

