<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: subsearches in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527531#M148920</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/47285"&gt;@phoenix09&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;could you share some sample of your events? both correct and not correct.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Mon, 02 Nov 2020 13:34:52 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2020-11-02T13:34:52Z</dc:date>
    <item>
      <title>subsearches</title>
      <link>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527466#M148894</link>
      <description>&lt;LI-SPOILER&gt;hello&lt;/LI-SPOILER&gt;</description>
      <pubDate>Mon, 02 Nov 2020 05:46:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527466#M148894</guid>
      <dc:creator>phoenix09</dc:creator>
      <dc:date>2020-11-02T05:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: subsearches</title>
      <link>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527467#M148895</link>
      <description>&lt;LI-SPOILER&gt;&lt;P&gt;1. I need to create an alert for http 500 failures&lt;/P&gt;&lt;P&gt;2. But I there is this scenario where some http 500 events when triggered, triggers one more event with a message. So I do not want these type of 500 events to be included in the alert&lt;/P&gt;&lt;P&gt;Please help with a query.&lt;/P&gt;&lt;/LI-SPOILER&gt;</description>
      <pubDate>Mon, 02 Nov 2020 05:48:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527467#M148895</guid>
      <dc:creator>phoenix09</dc:creator>
      <dc:date>2020-11-02T05:48:44Z</dc:date>
    </item>
    <item>
      <title>Re: subsearches</title>
      <link>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527471#M148898</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/47285"&gt;@phoenix09&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;did you identified or extracted the message?&lt;/P&gt;&lt;P&gt;if yes, you can simply exclude it from the search: in other words, if the message contains always the word INFO or you extracted the message field, try something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;your_search http_response=500 NOT INFO
| ...&lt;/LI-CODE&gt;&lt;P&gt;or&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;your_search http_response=500 NOT message=*
| ...&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 07:05:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527471#M148898</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-11-02T07:05:07Z</dc:date>
    </item>
    <item>
      <title>Re: subsearches</title>
      <link>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527527#M148917</link>
      <description>&lt;LI-SPOILER&gt;The http 500 event which is caused due to an exception has the same fields like the valid http 500 error event. So there is no unique word in the event that I can say NOT "this"&lt;/LI-SPOILER&gt;</description>
      <pubDate>Mon, 02 Nov 2020 13:27:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527527#M148917</guid>
      <dc:creator>phoenix09</dc:creator>
      <dc:date>2020-11-02T13:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: subsearches</title>
      <link>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527531#M148920</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/47285"&gt;@phoenix09&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;could you share some sample of your events? both correct and not correct.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 13:34:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527531#M148920</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-11-02T13:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: subsearches</title>
      <link>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527546#M148924</link>
      <description>&lt;P&gt;As of now I do not have the log for a valid 500 Error&lt;BR /&gt;&lt;BR /&gt;But for the 500 Error which I want to exclude has two events something like below&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Date&lt;/SPAN&gt;&lt;SPAN&gt;|LOG_LEVEL:INFO|THREAD_NAME:-|CORRELATION:-|MessID:&amp;lt;dynamicvalue&amp;gt;|&lt;/SPAN&gt;&lt;SPAN&gt;MESSAGE&lt;/SPAN&gt;&lt;SPAN&gt;:LOGTYPE, &lt;/SPAN&gt;&lt;SPAN&gt;SERVER&lt;/SPAN&gt;&lt;SPAN&gt;=ip, &lt;/SPAN&gt;&lt;SPAN&gt;URL&lt;/SPAN&gt;&lt;SPAN&gt;=-, URI=-, METHOD=POST, PARA={&lt;/SPAN&gt;&lt;SPAN&gt;"MessID"&lt;/SPAN&gt;&lt;SPAN&gt;:["&amp;lt;dynamicvalue&amp;gt;"],,&lt;/SPAN&gt;&lt;SPAN&gt;"Connection"&lt;/SPAN&gt;&lt;SPAN&gt;:["close"]}, CODE=&lt;/SPAN&gt;&lt;SPAN&gt;500&lt;/SPAN&gt;&lt;SPAN&gt;, RTIME=&lt;/SPAN&gt;&lt;SPAN&gt;342&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI-SPOILER&gt;&lt;LI-SPOILER&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Date&lt;/SPAN&gt;&lt;SPAN&gt;|LOG_LEVEL:ERROR|THREAD_NAME:-|CORRELATION:-|MessID:&amp;lt;dynamicvalue&amp;gt;|&lt;/SPAN&gt;&lt;SPAN&gt;MESSAGE&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;lt;some &lt;/SPAN&gt;&lt;SPAN&gt;message&lt;/SPAN&gt;&lt;SPAN&gt;&amp;gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;In the above "MessID"&amp;nbsp; value will be the same&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 14:28:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527546#M148924</guid>
      <dc:creator>phoenix09</dc:creator>
      <dc:date>2020-11-02T14:28:48Z</dc:date>
    </item>
    <item>
      <title>Re: subsearches</title>
      <link>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527552#M148927</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/47285"&gt;@phoenix09&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;it's difficoult to help you without having something to analyze!&lt;/P&gt;&lt;P&gt;the only way is to identify something unique in the logs to discard or to take.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 15:39:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/subsearches/m-p/527552#M148927</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-11-02T15:39:39Z</dc:date>
    </item>
  </channel>
</rss>

