<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Suppress well known events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61799#M15248</link>
    <description>&lt;P&gt;One method that could work is to use a lookup that will recognize whether the alert should be ignored or not. That would likely take some small amount of scripting to manage the alert state. You might use one search command to toggle an event's "triaged" flag (to steal ftk's phrasing) and then you could have two different searches on your dashboard. One with a lookup for untriaged events, which does the alert, and another with triaged events, so that you don't lose visibility of events you're ignoring. &lt;/P&gt;

&lt;P&gt;I'm thinking something along these lines: &lt;A href="http://answers.splunk.com/questions/3982/correlate-and-tag-splunk-events-with-change-control-tickets" rel="nofollow"&gt;http://answers.splunk.com/questions/3982/correlate-and-tag-splunk-events-with-change-control-tickets&lt;/A&gt; (also, conveniently, from ftk).&lt;/P&gt;</description>
    <pubDate>Thu, 17 Mar 2011 23:25:37 GMT</pubDate>
    <dc:creator>David</dc:creator>
    <dc:date>2011-03-17T23:25:37Z</dc:date>
    <item>
      <title>Suppress well known events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61794#M15243</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;we've the following scenario.&lt;/P&gt;

&lt;P&gt;A logmessage indicates that a CPU-Fan has failed&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Mar 17 11:00:21 h045ap 2011-03-17 rmclomv &amp;lt;kern.err&amp;gt; [ID 431010 kern.error] CPU_FAN @ MB.P0.F0.RS has FAILED.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The event pops up in the dashboard. The systemadministrator opens a case with our HW supplier. The replacement is scheduled for the next day. Our systemmonitoring script is reporting the fault every half an hour. How do we suppress this event within Splunk until the CPU fan has been replaced?&lt;/P&gt;

&lt;P&gt;cheers,
Andy&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2011 17:07:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61794#M15243</guid>
      <dc:creator>kochera</dc:creator>
      <dc:date>2011-03-17T17:07:55Z</dc:date>
    </item>
    <item>
      <title>Re: Suppress well known events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61795#M15244</link>
      <description>&lt;P&gt;You could &lt;A href="http://www.splunk.com/base/Documentation/latest/Knowledge/Defineeventtypes" rel="nofollow"&gt;create an event type&lt;/A&gt; based on the message and include a filter on the event type in your dashboard search. When creating an even ttype through Splunkweb be sure to adjust the permissions to make it visible to the rest of your team.&lt;/P&gt;

&lt;P&gt;For example, create an event type "triaged_error" for the fan failure on that particular host, and add &lt;CODE&gt;NOT eventtype="triaged_error"&lt;/CODE&gt; to your dashboard search to hide this event type. After the fan is replaced it is likely best to remove or disable the event type so that you don't accidentally filter any untriaged errors in the future.&lt;/P&gt;

&lt;P&gt;The event type could look like this for example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="my_sourcetype" h045ap rmclomv "CPU_FAN @ MB.P0.F0.RS has FAILED"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 17 Mar 2011 20:01:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61795#M15244</guid>
      <dc:creator>ftk</dc:creator>
      <dc:date>2011-03-17T20:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: Suppress well known events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61796#M15245</link>
      <description>&lt;P&gt;Hi, I'm not sure if this is going to scale in a large momnitoring environment. Basically we would like to suppress any kind of event within a context sensitive menu.&lt;/P&gt;

&lt;P&gt;andy&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2011 20:29:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61796#M15245</guid>
      <dc:creator>kochera</dc:creator>
      <dc:date>2011-03-17T20:29:33Z</dc:date>
    </item>
    <item>
      <title>Re: Suppress well known events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61797#M15246</link>
      <description>&lt;P&gt;It appears in 4.2 you can 'throttle' alerts - &lt;/P&gt;

&lt;P&gt;more info here - &lt;A href="http://www.splunk.com/base/Documentation/latest/User/Alertusecases" rel="nofollow"&gt;http://www.splunk.com/base/Documentation/latest/User/Alertusecases&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2011 21:13:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61797#M15246</guid>
      <dc:creator>netwrkr</dc:creator>
      <dc:date>2011-03-17T21:13:28Z</dc:date>
    </item>
    <item>
      <title>Re: Suppress well known events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61798#M15247</link>
      <description>&lt;P&gt;You could re-direct those events to the bit bucket:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;props.conf
[syslog]
TRANSFORMS-removefan=cleanfanalerts

transforms.conf
[cleanfanalerts]
REGEX = (?m).+CPU_FAN\s+@\s+MB.P0.F0.RS\s+has\s+FAILED$
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 17 Mar 2011 21:24:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61798#M15247</guid>
      <dc:creator>nocostk</dc:creator>
      <dc:date>2011-03-17T21:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: Suppress well known events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61799#M15248</link>
      <description>&lt;P&gt;One method that could work is to use a lookup that will recognize whether the alert should be ignored or not. That would likely take some small amount of scripting to manage the alert state. You might use one search command to toggle an event's "triaged" flag (to steal ftk's phrasing) and then you could have two different searches on your dashboard. One with a lookup for untriaged events, which does the alert, and another with triaged events, so that you don't lose visibility of events you're ignoring. &lt;/P&gt;

&lt;P&gt;I'm thinking something along these lines: &lt;A href="http://answers.splunk.com/questions/3982/correlate-and-tag-splunk-events-with-change-control-tickets" rel="nofollow"&gt;http://answers.splunk.com/questions/3982/correlate-and-tag-splunk-events-with-change-control-tickets&lt;/A&gt; (also, conveniently, from ftk).&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2011 23:25:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61799#M15248</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2011-03-17T23:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: Suppress well known events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61800#M15249</link>
      <description>&lt;P&gt;I'd probably go with lookups then as David suggests.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2011 23:40:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61800#M15249</guid>
      <dc:creator>ftk</dc:creator>
      <dc:date>2011-03-17T23:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: Suppress well known events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61801#M15250</link>
      <description>&lt;P&gt;Lookups are a good call on this.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2011 23:41:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Suppress-well-known-events/m-p/61801#M15250</guid>
      <dc:creator>ftk</dc:creator>
      <dc:date>2011-03-17T23:41:23Z</dc:date>
    </item>
  </channel>
</rss>

