<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do you execute a two pattern search where the first pattern host(is a field ) should be ignored on second pattern search? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382138#M167530</link>
    <description>&lt;P&gt;Thanks for your help &lt;/P&gt;</description>
    <pubDate>Mon, 17 Sep 2018 12:14:59 GMT</pubDate>
    <dc:creator>jeevananm06</dc:creator>
    <dc:date>2018-09-17T12:14:59Z</dc:date>
    <item>
      <title>How do you execute a two pattern search where the first pattern host(is a field ) should be ignored on second pattern search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382134#M167526</link>
      <description>&lt;P&gt;I was executing my search on a log file.&lt;/P&gt;

&lt;P&gt;This is the  pattern i want to search ** END ABCD234**  &lt;STRONG&gt;hour&amp;gt;00&lt;/STRONG&gt; where this shouldn't be searched on several &lt;STRONG&gt;host&lt;/STRONG&gt;(servers). &lt;/P&gt;

&lt;P&gt;The host that needs to be ignored can be identified by this pattern &lt;STRONG&gt;"DISABLE" "END" hour&amp;gt;00&lt;/STRONG&gt; &lt;/P&gt;

&lt;P&gt;Here, hour is a field extracted from timestamp  (Example:&lt;STRONG&gt;01&lt;/STRONG&gt;:15:38- here 01 was extracted). &lt;/P&gt;

&lt;P&gt;Please let me know if more info needed.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Sep 2018 10:38:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382134#M167526</guid>
      <dc:creator>jeevananm06</dc:creator>
      <dc:date>2018-09-14T10:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: How do you execute a two pattern search where the first pattern host(is a field ) should be ignored on second pattern search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382135#M167527</link>
      <description>&lt;P&gt;looks like do-able task....&lt;BR /&gt;
yes, more info needed please..&lt;/P&gt;</description>
      <pubDate>Fri, 14 Sep 2018 13:28:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382135#M167527</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2018-09-14T13:28:04Z</dc:date>
    </item>
    <item>
      <title>Re: How do you execute a two pattern search where the first pattern host(is a field ) should be ignored on second pattern search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382136#M167528</link>
      <description>&lt;P&gt;If "DISABLE" is the keyword that need to be ignored, then specify this before the hour field. &lt;/P&gt;

&lt;P&gt;Like, &lt;CODE&gt;index=idx END NOT "DISABLE" | where hour&amp;gt;00&lt;/CODE&gt;. If this is not what you're looking for, then please provide sample events which has these keywords.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Sep 2018 13:30:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382136#M167528</guid>
      <dc:creator>sudosplunk</dc:creator>
      <dc:date>2018-09-14T13:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: How do you execute a two pattern search where the first pattern host(is a field ) should be ignored on second pattern search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382137#M167529</link>
      <description>&lt;P&gt;It seems like you want to search which has &lt;CODE&gt;END ABCD234 hour&amp;gt;00&lt;/CODE&gt; as pattern (event 1) but does not have &lt;CODE&gt;DISABLE END hour&amp;gt;00&lt;/CODE&gt; (separate event 2). If that's the case, you can try something like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=yourindex sourcetype=yoursourcetype END ABCD234 hour&amp;gt;00 NOT [search index=yourindex sourcetype=yoursourcetype DISABLE END hour&amp;gt;00 | stats count by host | table host ]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The subsearch would exclude all the hosts that have &lt;CODE&gt;DISABLE END hour&amp;gt;00&lt;/CODE&gt; events, from the main search result.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Sep 2018 13:55:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382137#M167529</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2018-09-14T13:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: How do you execute a two pattern search where the first pattern host(is a field ) should be ignored on second pattern search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382138#M167530</link>
      <description>&lt;P&gt;Thanks for your help &lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 12:14:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382138#M167530</guid>
      <dc:creator>jeevananm06</dc:creator>
      <dc:date>2018-09-17T12:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: How do you execute a two pattern search where the first pattern host(is a field ) should be ignored on second pattern search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382139#M167531</link>
      <description>&lt;P&gt;@jeevananm06 if your issue is resolved do accept this answer to mark your question as answered!&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 17:01:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382139#M167531</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2018-09-17T17:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: How do you execute a two pattern search where the first pattern host(is a field ) should be ignored on second pattern search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382140#M167532</link>
      <description>&lt;P&gt;Done Thanks for your help&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 07:35:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-execute-a-two-pattern-search-where-the-first-pattern/m-p/382140#M167532</guid>
      <dc:creator>jeevananm06</dc:creator>
      <dc:date>2018-09-19T07:35:17Z</dc:date>
    </item>
  </channel>
</rss>

