<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic props.conf w/ Regex ? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20748#M3295</link>
    <description>&lt;P&gt;is it possible to exclude specific results in a field from the search in the props.conf?  I suppose more specifically on the backend?&lt;/P&gt;

&lt;P&gt;Currently I am using a series of regex statements to exclude some values such as:&lt;/P&gt;

&lt;P&gt;&amp;lt; mysearch &amp;gt; | regex &amp;lt; field1 &amp;gt;!= &amp;lt; value &amp;gt; | regex &amp;lt; field1 &amp;gt;!= &amp;lt; value &amp;gt;&lt;/P&gt;

&lt;P&gt;is there a better way to do this? &lt;/P&gt;</description>
    <pubDate>Tue, 30 Apr 2013 21:50:04 GMT</pubDate>
    <dc:creator>tmarlette</dc:creator>
    <dc:date>2013-04-30T21:50:04Z</dc:date>
    <item>
      <title>props.conf w/ Regex ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20748#M3295</link>
      <description>&lt;P&gt;is it possible to exclude specific results in a field from the search in the props.conf?  I suppose more specifically on the backend?&lt;/P&gt;

&lt;P&gt;Currently I am using a series of regex statements to exclude some values such as:&lt;/P&gt;

&lt;P&gt;&amp;lt; mysearch &amp;gt; | regex &amp;lt; field1 &amp;gt;!= &amp;lt; value &amp;gt; | regex &amp;lt; field1 &amp;gt;!= &amp;lt; value &amp;gt;&lt;/P&gt;

&lt;P&gt;is there a better way to do this? &lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2013 21:50:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20748#M3295</guid>
      <dc:creator>tmarlette</dc:creator>
      <dc:date>2013-04-30T21:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: props.conf w/ Regex ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20749#M3296</link>
      <description>&lt;P&gt;Not sure what you mean, really.&lt;/P&gt;

&lt;P&gt;With props/transforms you can filter out events so they &lt;EM&gt;never get indexed&lt;/EM&gt;. You can also set up search time field extractions and field aliases, for example.&lt;/P&gt;

&lt;P&gt;However, you can't filter out search results the way your search example describes. &lt;/P&gt;

&lt;P&gt;Also, why use &lt;CODE&gt;| regex field != value&lt;/CODE&gt; ? Unless you have some pattern matching to do, you could stick it before the first pipe as &lt;CODE&gt;field != value&lt;/CODE&gt; or use &lt;CODE&gt;| search field != value&lt;/CODE&gt;. But perhaps these are newly eval'ed fields of a complicated nature. &lt;/P&gt;

&lt;P&gt;Perhaps if you provide some sample events you'd be able to get better help.&lt;/P&gt;

&lt;P&gt;/K&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2013 23:44:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20749#M3296</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-04-30T23:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: props.conf w/ Regex ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20750#M3297</link>
      <description>&lt;P&gt;In this case i'm looking in web logs. Some of the fields periodically (such as useragent) end up with a null value because of internal machine queries. this throws off some our analytics. &lt;/P&gt;

&lt;P&gt;I have to keep the events, simply because they are web events, and the values change. not everything that connects to our web environment has a null value for the useragent field. &lt;/P&gt;

&lt;P&gt;I'm looking to see if there is a way that I can simply exclude the 'null' results on the back end, as opposed to doing it in the search query?&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2013 16:13:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20750#M3297</guid>
      <dc:creator>tmarlette</dc:creator>
      <dc:date>2013-05-01T16:13:45Z</dc:date>
    </item>
    <item>
      <title>Re: props.conf w/ Regex ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20751#M3298</link>
      <description>&lt;P&gt;I've tried to use your suggestion of &lt;/P&gt;

&lt;P&gt;field!=value however it is not taking. I assume my syntax is wrong. this ONLY returns the results that I don't want to see. &lt;/P&gt;

&lt;P&gt;This is my search string:&lt;/P&gt;

&lt;P&gt;sourcetype=www source=&amp;lt; mysource &amp;gt; hck!=health hck!=Health&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2013 18:33:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20751#M3298</guid>
      <dc:creator>tmarlette</dc:creator>
      <dc:date>2013-05-01T18:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: props.conf w/ Regex ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20752#M3299</link>
      <description>&lt;P&gt;I guess that &lt;CODE&gt;hck&lt;/CODE&gt; is an extracted field. Post a few events, and describe which ones you want to filter out of the search results, and why (i.e. on what criteria)&lt;/P&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2013 18:55:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20752#M3299</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-05-01T18:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: props.conf w/ Regex ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20753#M3300</link>
      <description>&lt;P&gt;Hmm, if you just want to ensure that the user_agent is not null, I guess you could search for;&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;sourcetype=www user_agent=*&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;This will only return events that contain the field user_agent, and where it has a non-null value. Of course you can add more fields like &lt;CODE&gt;referer=*&lt;/CODE&gt; or &lt;CODE&gt;clientip=*&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2013 20:05:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20753#M3300</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-05-01T20:05:26Z</dc:date>
    </item>
    <item>
      <title>Re: props.conf w/ Regex ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20754#M3301</link>
      <description>&lt;P&gt;That's OK... I just used the regex statements to filter out all of the unwanted events in the search itself. It doesn't seem like there is a way to do it in props / transforms.conf&lt;/P&gt;

&lt;P&gt;Thank you !&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2013 13:13:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/props-conf-w-Regex/m-p/20754#M3301</guid>
      <dc:creator>tmarlette</dc:creator>
      <dc:date>2013-05-13T13:13:04Z</dc:date>
    </item>
  </channel>
</rss>

