<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to reduce the cisco ASA logs using regex? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348484#M103149</link>
    <description>&lt;P&gt;Hi,&lt;BR /&gt;
maybe try to "escape" the dots in your regex.&lt;/P&gt;

&lt;P&gt;Like this: &lt;CODE&gt;(169\.254\.255\.255)&lt;/CODE&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 16 Jun 2017 16:28:32 GMT</pubDate>
    <dc:creator>horsefez</dc:creator>
    <dc:date>2017-06-16T16:28:32Z</dc:date>
    <item>
      <title>How to reduce the cisco ASA logs using regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348480#M103145</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Is there a way to ignore a event containing the message before indexing using regex in props.conf and transforms.conf&lt;/P&gt;

&lt;P&gt;ignore the msg contains "10.11.12.133 to 10.11.12.134 "?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 14:11:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348480#M103145</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-06-16T14:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to reduce the cisco ASA logs using regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348481#M103146</link>
      <description>&lt;P&gt;You can follow instructions from below link on dropping specific events ( containing those IP addresses) and index the rest. &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.5.2/Forwarding/Routeandfilterdatad#Discard_specific_events_and_keep_the_rest"&gt;http://docs.splunk.com/Documentation/Splunk/6.5.2/Forwarding/Routeandfilterdatad#Discard_specific_events_and_keep_the_rest&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;On INdexer/Heavy Forwarder (whichever comes first in flow)&lt;BR /&gt;
In props.conf, set the TRANSFORMS-null attribute:&lt;BR /&gt;
[&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[YourSourceTypeNameHere]
TRANSFORMS-null= setnull
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Create a corresponding stanza in transforms.conf. Set DEST_KEY to "queue" and FORMAT to "nullQueue":&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setnull]
REGEX = (10\.11\.12\.133|10\.11\.12\.134)
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Restart Splunk Enterprise.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 14:47:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348481#M103146</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-06-16T14:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to reduce the cisco ASA logs using regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348482#M103147</link>
      <description>&lt;P&gt;When you say "ignore" do you mean "prevent from being indexed" or "once indexed, prevent from showing in my search"?&lt;/P&gt;

&lt;P&gt;Assuming the former:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.6.1/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues"&gt;http://docs.splunk.com/Documentation/Splunk/6.6.1/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 14:58:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348482#M103147</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-06-16T14:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to reduce the cisco ASA logs using regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348483#M103148</link>
      <description>&lt;P&gt;Hi somesoni2,&lt;/P&gt;

&lt;P&gt;I added this on Heavy Forwarder and also On indexers,  I changed it to ignore any logs containing 169.244.255.255. I still see the logs indexing,&lt;/P&gt;

&lt;P&gt;I added the below in props.conf and transforms.conf. &lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;P&gt;[cisco:asa]&lt;BR /&gt;
TRANSFORMS-null= setnull&lt;/P&gt;

&lt;P&gt;[setnull]&lt;BR /&gt;
REGEX = (169.254.255.255)&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 16:07:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348483#M103148</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-06-16T16:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to reduce the cisco ASA logs using regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348484#M103149</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
maybe try to "escape" the dots in your regex.&lt;/P&gt;

&lt;P&gt;Like this: &lt;CODE&gt;(169\.254\.255\.255)&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 16:28:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348484#M103149</guid>
      <dc:creator>horsefez</dc:creator>
      <dc:date>2017-06-16T16:28:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to reduce the cisco ASA logs using regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348485#M103150</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;

&lt;P&gt;I'm using  . , It was changed in the comment.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 16:45:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348485#M103150</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-06-16T16:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to reduce the cisco ASA logs using regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348486#M103151</link>
      <description>&lt;P&gt;Did you restart Splunk after making the change? ALso, this filter will be applicable for any data that'll come after you made the change, any older data would remain as is.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 16:48:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348486#M103151</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-06-16T16:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to reduce the cisco ASA logs using regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348487#M103152</link>
      <description>&lt;P&gt;Thank you it worked.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 17:00:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348487#M103152</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-06-16T17:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to reduce the cisco ASA logs using regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348488#M103153</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;

&lt;P&gt;I also have 2 more IP's to avoid before Indexing,  169.225.1.2.3 and 165.244.253.255, Do I have to create  new stanza Or I can use the old one to add Ip's?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 18:10:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348488#M103153</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-06-20T18:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to reduce the cisco ASA logs using regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348489#M103154</link>
      <description>&lt;P&gt;just add them to the existing stanza like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(10\.11\.12\.133|10\.11\.12\.134|&amp;lt;next-ip&amp;gt;|&amp;lt;next-ip&amp;gt;)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 22 Jun 2017 15:37:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348489#M103154</guid>
      <dc:creator>horsefez</dc:creator>
      <dc:date>2017-06-22T15:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to reduce the cisco ASA logs using regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348490#M103155</link>
      <description>&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 16:01:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-reduce-the-cisco-ASA-logs-using-regex/m-p/348490#M103155</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-06-22T16:01:42Z</dc:date>
    </item>
  </channel>
</rss>

