<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk not ignoring field with NOT in subsearch in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602194#M209609</link>
    <description>&lt;P&gt;is there any other way i can use the same logic to exclude results with 100% success?&lt;/P&gt;</description>
    <pubDate>Fri, 17 Jun 2022 06:55:10 GMT</pubDate>
    <dc:creator>deepakgarg1373</dc:creator>
    <dc:date>2022-06-17T06:55:10Z</dc:date>
    <item>
      <title>Why is Splunk not ignoring field with NOT in subsearch?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602093#M209572</link>
      <description>&lt;P&gt;this is my query&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;earliest=-15m latest=now index=** host="*" LOG_LEVEL=ERROR OR LOG_LEVEL=FATAL OR logLevel=ERROR OR level=error  | rex field=MESSAGE "(?&amp;lt;message&amp;gt;.{35})" | search NOT [ search earliest=-3d@d latest=-d@d index=wiweb host="*" LOG_LEVEL=ERROR OR LOG_LEVEL=FATAL OR logLevel=ERROR OR level=error  | rex field=MESSAGE "(?&amp;lt;message&amp;gt;.{35})" | dedup message | fields message ] | stats count by message appname  | search count&amp;gt;50 | sort appname , -count&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;ALmost all the recurring 'message' is getting ignored but few of them still come in the result even if those are there in last 2 days (which should have been ignored which is what subsearch is doing)&lt;BR /&gt;is there anything else i can do to run this query with 100% success?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 15:46:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602093#M209572</guid>
      <dc:creator>deepakgarg1373</dc:creator>
      <dc:date>2022-06-21T15:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602110#M209581</link>
      <description>&lt;P&gt;Subsearches are limited to (usually) 50,000 events so you may not be excluding all the messages you think should be excluded. Does the job inspector give you any messages indicating that this has happened?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2022 15:19:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602110#M209581</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-06-16T15:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602193#M209608</link>
      <description>&lt;UL&gt;&lt;LI&gt;info :&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;The limit has been reached for log messages in info.csv. 103 messages have not been written to info.csv. Refer to search.log for these messages or limits.conf to configure this limit.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 17 Jun 2022 06:54:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602193#M209608</guid>
      <dc:creator>deepakgarg1373</dc:creator>
      <dc:date>2022-06-17T06:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602194#M209609</link>
      <description>&lt;P&gt;is there any other way i can use the same logic to exclude results with 100% success?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 06:55:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602194#M209609</guid>
      <dc:creator>deepakgarg1373</dc:creator>
      <dc:date>2022-06-17T06:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602203#M209612</link>
      <description>&lt;P&gt;Try something like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(earliest=-15m latest=now index=**) OR (earliest=-3d@d latest=-d@d index=wiweb) host="*" LOG_LEVEL=ERROR OR LOG_LEVEL=FATAL OR logLevel=ERROR OR level=error  
| rex field=MESSAGE "(?&amp;lt;message&amp;gt;.{35})" 
| bin _time span=1d
| stats count by _time message appname
| stats count as days count(eval(_time==relative_time(now(),"@d"))) as today values(count) as count by message appname
| where days=1 AND today=1 AND count&amp;gt;50 
| sort appname, -count&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 17 Jun 2022 07:45:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602203#M209612</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-06-17T07:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602210#M209618</link>
      <description>&lt;P&gt;there was one typo in my original query&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;earliest=-15m latest=now index=&lt;STRONG&gt;wiweb&lt;/STRONG&gt; host="*" LOG_LEVEL=ERROR OR LOG_LEVEL=FATAL OR logLevel=ERROR OR level=error&amp;nbsp; | rex field=MESSAGE "(?&amp;lt;message&amp;gt;.{35})" | search NOT [ search earliest=-3d@d latest=-d@d index=wiweb host="*" LOG_LEVEL=ERROR OR LOG_LEVEL=FATAL OR logLevel=ERROR OR level=error&amp;nbsp; | rex field=MESSAGE "(?&amp;lt;message&amp;gt;.{35})" | dedup message | fields message ] | stats count by message appname&amp;nbsp; | search count&amp;gt;50 | sort appname , -count&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;still your query holds true, right?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 08:50:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602210#M209618</guid>
      <dc:creator>deepakgarg1373</dc:creator>
      <dc:date>2022-06-17T08:50:12Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602211#M209619</link>
      <description>&lt;P&gt;I thought there might have been, but you never know!&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(earliest=-15m latest=now) OR (earliest=-3d@d latest=-d@d) index=wiweb host="*" LOG_LEVEL=ERROR OR LOG_LEVEL=FATAL OR logLevel=ERROR OR level=error  
| rex field=MESSAGE "(?&amp;lt;message&amp;gt;.{35})" 
| bin _time span=1d
| stats count by _time message appname
| stats count as days count(eval(_time==relative_time(now(),"@d"))) as today values(count) as count by message appname
| where days=1 AND today=1 AND count&amp;gt;50 
| sort appname, -count&lt;/LI-CODE&gt;&lt;P&gt;The key line is the where command which is filtering for events which have only occurred today.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 08:54:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602211#M209619</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-06-17T08:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602213#M209620</link>
      <description>&lt;P&gt;Awesome, looks to be working &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;how can i remove 'days' and 'today' from the result but still get the filtered output?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 09:08:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602213#M209620</guid>
      <dc:creator>deepakgarg1373</dc:creator>
      <dc:date>2022-06-17T09:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602218#M209621</link>
      <description>&lt;P&gt;ah simple table worked ..thanks a lot&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 09:15:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602218#M209621</guid>
      <dc:creator>deepakgarg1373</dc:creator>
      <dc:date>2022-06-17T09:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602364#M209663</link>
      <description>&lt;P&gt;hello..i let the new query run for the weekend every 15 mins ...looks like my original query is giving me diff results and not getting the same 'message' using the updated query.&amp;nbsp;&lt;BR /&gt;when checked manually, the original query result seem to be genuine.&lt;/P&gt;&lt;P&gt;so not sure why the updated query didnt capture the new error 'message'&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 06:43:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602364#M209663</guid>
      <dc:creator>deepakgarg1373</dc:creator>
      <dc:date>2022-06-20T06:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602801#M209823</link>
      <description>&lt;P&gt;another issue is - it will check for message and appname together - what if the same message is there in other app and it is still throwing&amp;nbsp; an alert when that message is not relevent as that has come in other app already and can be ignored?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 13:54:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602801#M209823</guid>
      <dc:creator>deepakgarg1373</dc:creator>
      <dc:date>2022-06-22T13:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602802#M209824</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp; please help&amp;nbsp; me.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 13:55:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602802#M209824</guid>
      <dc:creator>deepakgarg1373</dc:creator>
      <dc:date>2022-06-22T13:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602805#M209825</link>
      <description>&lt;P&gt;I am not sure I understand the requirement here. Are you saying that if the message has been logged regardless of which appname in the last two days you want to ignore it, even if it is the first time it has been logged for this appname?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 14:06:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602805#M209825</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-06-22T14:06:42Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602807#M209826</link>
      <description>&lt;P&gt;Exactly!&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 14:08:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602807#M209826</guid>
      <dc:creator>deepakgarg1373</dc:creator>
      <dc:date>2022-06-22T14:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602812#M209828</link>
      <description>&lt;P&gt;Try this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(earliest=-15m latest=now) OR (earliest=-3d@d latest=-d@d) index=wiweb host="*" LOG_LEVEL=ERROR OR LOG_LEVEL=FATAL OR logLevel=ERROR OR level=error  
| rex field=MESSAGE "(?&amp;lt;message&amp;gt;.{35})" 
| bin _time span=1d
| stats count by _time message appname
| stats count as days count(eval(_time==relative_time(now(),"@d"))) as today values(count) as count values(appname) as appname by message
| where days=1 AND today=1 AND count&amp;gt;50 
| sort appname, -count&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 22 Jun 2022 14:15:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602812#M209828</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-06-22T14:15:14Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk not ignoring field with NOT in subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602818#M209829</link>
      <description>&lt;P&gt;i have updated the query - will let it run for one day and will let you know if all good. THanks a LOT &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 14:35:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Splunk-not-ignoring-field-with-NOT-in-subsearch/m-p/602818#M209829</guid>
      <dc:creator>deepakgarg1373</dc:creator>
      <dc:date>2022-06-22T14:35:17Z</dc:date>
    </item>
  </channel>
</rss>

