<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Syslog Filteration in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Syslog-Filteration/m-p/543769#M154038</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You can use the below filter in the Syslog config. And it will filter only required logs.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;filter test{ match( "sgt=4" value("MESSAGE"));};&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you need to add an additional filter you can just use OR operation.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;filter test{ match( "sgt=4" value("MESSAGE"));&amp;nbsp;or match( "provide your keyword" value("MESSAGE"));};&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;if this answer helps you then upvote it&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Mar 2021 05:05:28 GMT</pubDate>
    <dc:creator>Vardhan</dc:creator>
    <dc:date>2021-03-15T05:05:28Z</dc:date>
    <item>
      <title>Syslog Filteration</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Syslog-Filteration/m-p/543768#M154037</link>
      <description>&lt;P&gt;We are receiving around 300gigs of syslog data everyday and we want to filter all the logs and index only what the network team wants us to. what is the configuration changes that can help me to achieve this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I filter all the unnecessary logs from the syslog server?&lt;/P&gt;&lt;P&gt;I just need to index the events, where one of the field says sgt=4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;&lt;P&gt;Manyutej Sanjeev&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 04:38:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Syslog-Filteration/m-p/543768#M154037</guid>
      <dc:creator>novotxms</dc:creator>
      <dc:date>2021-03-15T04:38:30Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog Filteration</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Syslog-Filteration/m-p/543769#M154038</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You can use the below filter in the Syslog config. And it will filter only required logs.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;filter test{ match( "sgt=4" value("MESSAGE"));};&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you need to add an additional filter you can just use OR operation.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;filter test{ match( "sgt=4" value("MESSAGE"));&amp;nbsp;or match( "provide your keyword" value("MESSAGE"));};&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;if this answer helps you then upvote it&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 05:05:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Syslog-Filteration/m-p/543769#M154038</guid>
      <dc:creator>Vardhan</dc:creator>
      <dc:date>2021-03-15T05:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog Filteration</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Syslog-Filteration/m-p/544884#M154300</link>
      <description>&lt;P&gt;Any other answers please?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 07:25:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Syslog-Filteration/m-p/544884#M154300</guid>
      <dc:creator>novotxms</dc:creator>
      <dc:date>2021-03-23T07:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog Filteration</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Syslog-Filteration/m-p/544946#M154313</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/232479"&gt;@novotxms&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You can try sample below;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.1.2/Forwarding/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.1.2/Forwarding/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[source::/var/log/messages]
TRANSFORMS-set= setnull,setparsing

transforms.conf
[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX = sgt\=4
DEST_KEY = queue
FORMAT = indexQueue&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 14:33:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Syslog-Filteration/m-p/544946#M154313</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2021-03-23T14:33:44Z</dc:date>
    </item>
  </channel>
</rss>

