<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filter event data using conditional regex in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356059#M105364</link>
    <description>&lt;P&gt;what does the last point 'if "EventType":"Login" not equals to Login index those event'  mean?&lt;/P&gt;</description>
    <pubDate>Sun, 24 Sep 2017 12:04:28 GMT</pubDate>
    <dc:creator>Sukisen1981</dc:creator>
    <dc:date>2017-09-24T12:04:28Z</dc:date>
    <item>
      <title>Filter event data using conditional regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356058#M105363</link>
      <description>&lt;P&gt;HI All,&lt;/P&gt;

&lt;P&gt;Below is my raw event data . &lt;BR /&gt;
 {"FormatVersion":"1.1","StartTime":"2017-09-22T01:11:38.565Z","EndTime":"2017-09-22T01:11:39.468Z","EventType":"Login","Result":"Success","UserId":"dmorand","TerminalId":"172.16.3.85","SessionId":"RCIcAM1DxUYmG7WMDMkEuQXyGTpOqcBMtyrGOPpFUPU=","LoginUri":"/login-auth/saml","EventSource":"Platform","ServerHostname":"fe02.hbc.stage.us-west-2.orionsaas"}&lt;/P&gt;

&lt;P&gt;I want event indexing like below condition.&lt;BR /&gt;
1. IF "EventType":"Login" and "LoginUri":"/login-auth/saml" the index those event. means we need to discard those event in which event type = login and login uri != /login-auth/saml &lt;BR /&gt;
2. if "EventType":"Login" and "LoginUri" is not present then index those event&lt;BR /&gt;
3. If in logs event type not equal to login then index those events also&lt;/P&gt;

&lt;P&gt;please help for making this regex .&lt;/P&gt;</description>
      <pubDate>Sat, 23 Sep 2017 04:56:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356058#M105363</guid>
      <dc:creator>anshul0915</dc:creator>
      <dc:date>2017-09-23T04:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: Filter event data using conditional regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356059#M105364</link>
      <description>&lt;P&gt;what does the last point 'if "EventType":"Login" not equals to Login index those event'  mean?&lt;/P&gt;</description>
      <pubDate>Sun, 24 Sep 2017 12:04:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356059#M105364</guid>
      <dc:creator>Sukisen1981</dc:creator>
      <dc:date>2017-09-24T12:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: Filter event data using conditional regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356060#M105365</link>
      <description>&lt;P&gt;If in logs event type not equal to login then index those events also&lt;/P&gt;</description>
      <pubDate>Sun, 24 Sep 2017 12:10:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356060#M105365</guid>
      <dc:creator>anshul0915</dc:creator>
      <dc:date>2017-09-24T12:10:13Z</dc:date>
    </item>
    <item>
      <title>Re: Filter event data using conditional regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356061#M105366</link>
      <description>&lt;P&gt;one last question - do you want to extract them in the conf files before getting indexed or you want to write a post search regex to extract ONLY these events using regex for this particular use case?&lt;/P&gt;</description>
      <pubDate>Sun, 24 Sep 2017 15:20:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356061#M105366</guid>
      <dc:creator>Sukisen1981</dc:creator>
      <dc:date>2017-09-24T15:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: Filter event data using conditional regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356062#M105367</link>
      <description>&lt;P&gt;Want in conf file before getting indexed &lt;/P&gt;</description>
      <pubDate>Sun, 24 Sep 2017 15:44:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356062#M105367</guid>
      <dc:creator>anshul0915</dc:creator>
      <dc:date>2017-09-24T15:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: Filter event data using conditional regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356063#M105368</link>
      <description>&lt;P&gt;Props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; [sourcetypeName]
 KV_MODE=json
 INDEXED_EXTRACTIONS=true
 TRANSFORMS-toNull=toNull
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; [toNull]
 REGEX= .*^((?!EventType":"Login".*LoginUri":"\/login-auth\/saml).*)
 DEST_KEY=queue
 FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 24 Sep 2017 16:54:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356063#M105368</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2017-09-24T16:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: Filter event data using conditional regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356064#M105369</link>
      <description>&lt;P&gt;Needs to be on the forwarder(s) and indexer(s).  Will only apply to new data that is indexed after the settings are in placeZ &lt;/P&gt;</description>
      <pubDate>Sun, 24 Sep 2017 17:09:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356064#M105369</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2017-09-24T17:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: Filter event data using conditional regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356065#M105370</link>
      <description>&lt;P&gt;Why on both places configuration required . On only indexer will it not work??&lt;/P&gt;</description>
      <pubDate>Sun, 24 Sep 2017 17:41:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356065#M105370</guid>
      <dc:creator>anshul0915</dc:creator>
      <dc:date>2017-09-24T17:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: Filter event data using conditional regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356066#M105371</link>
      <description>&lt;P&gt;INDEXED_EXTRACTIONS has to be on the forwarder.  The queue routing happens on first full Splunk instance (heavy forwarder or indexer).&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2017 18:26:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-event-data-using-conditional-regex/m-p/356066#M105371</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2017-09-25T18:26:10Z</dc:date>
    </item>
  </channel>
</rss>

