<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to filter a specific string from Splunk event logs at index-time? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130391#M35526</link>
    <description>&lt;P&gt;Here is what you need to use the &lt;CODE&gt;nullQueue&lt;/CODE&gt;:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.4/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.4/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&lt;BR /&gt;
&lt;A href="http://answers.splunk.com/answers/86147/redirect-to-null-queue-is-not-working.html"&gt;http://answers.splunk.com/answers/86147/redirect-to-null-queue-is-not-working.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 20 Jul 2015 16:41:42 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2015-07-20T16:41:42Z</dc:date>
    <item>
      <title>How to filter a specific string from Splunk event logs at index-time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130390#M35525</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;

&lt;P&gt;I have requirement where need to filter(ignore) "---------------------------------------------"  from the event logs, I have tried with the blacklist attribute in inputs.conf, but it is not working. Do we need to create props.conf and transforms.conf file, or we can ignore these dashes from inputs.conf only?&lt;/P&gt;

&lt;P&gt;Please let me know which solution is best here, if we need to create a &lt;CODE&gt;props.conf&lt;/CODE&gt; and &lt;CODE&gt;transforms.conf&lt;/CODE&gt;, then what will be the contents of the files?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2015 10:57:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130390#M35525</guid>
      <dc:creator>snehalk</dc:creator>
      <dc:date>2015-07-20T10:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter a specific string from Splunk event logs at index-time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130391#M35526</link>
      <description>&lt;P&gt;Here is what you need to use the &lt;CODE&gt;nullQueue&lt;/CODE&gt;:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.4/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.4/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&lt;BR /&gt;
&lt;A href="http://answers.splunk.com/answers/86147/redirect-to-null-queue-is-not-working.html"&gt;http://answers.splunk.com/answers/86147/redirect-to-null-queue-is-not-working.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2015 16:41:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130391#M35526</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-07-20T16:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter a specific string from Splunk event logs at index-time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130392#M35527</link>
      <description>&lt;P&gt;Hello Woodcock,&lt;/P&gt;

&lt;P&gt;Thanks for reply, as suggested I have deployed props.conf and transforms.conf on search heads but still the events are not filtering please let me know where i went wrong. &lt;/P&gt;

&lt;P&gt;Took sourcetype instate of source&lt;/P&gt;

&lt;P&gt;Props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[sourcetype::mydata]
TRANSFORMS-null= setnull
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setnull]
REGEX = [^----------------------------------------]
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 22 Jul 2015 14:42:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130392#M35527</guid>
      <dc:creator>snehalk</dc:creator>
      <dc:date>2015-07-22T14:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter a specific string from Splunk event logs at index-time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130393#M35528</link>
      <description>&lt;P&gt;You need to deploy these to your Indexers (not your Search Head) and then restart the Splunk instances running on them.  After that, the &lt;EM&gt;new&lt;/EM&gt; data will be fixed but the old/existing data will still be "wrong".  Also, use this (no square brackets) instead of what you have:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;REGEX = ^----------------------------------------
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Don't forget to "Accept" and answer to close the question.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2015 01:35:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130393#M35528</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-07-29T01:35:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter a specific string from Splunk event logs at index-time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130394#M35529</link>
      <description>&lt;P&gt;Did this work?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 16:35:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130394#M35529</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-10-16T16:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter a specific string from Splunk event logs at index-time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130395#M35530</link>
      <description>&lt;P&gt;Hey!&lt;/P&gt;

&lt;P&gt;First off  these configurations happen in the &lt;STRONG&gt;parsing phase&lt;/STRONG&gt;, before the indexing and searching phase, therefore &lt;BR /&gt;
both &lt;STRONG&gt;props.conf&lt;/STRONG&gt; and &lt;STRONG&gt;transforms.conf&lt;/STRONG&gt; should be placed in the indexer, not the search head as you mentioned before. My suggestion is that you place these files in &lt;CODE&gt;$SPLUNK_HOME/etc/system/local&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;The sourcetype stanza in &lt;STRONG&gt;props.conf&lt;/STRONG&gt; isn't right, it should be as follows:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; [mydata]
 TRANSFORMS-null = setnull
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Your regex is not matching the repeated dashes in the event, so I put together a little regex for you.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt; &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; [setnull]
 REGEX      = ^.*\s(\-+\S)
 DEST_KEY   = queue
 FORMAT     = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;Restart Splunk after changing these files.&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;If you don't wanna have the wrong old indexed data with the repeated dashes, one option is to use the &lt;STRONG&gt;DELETE&lt;/STRONG&gt; command in a search query that matches those events with "------" in them. i.e:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=yourindex sourcetype=mydata "---------------------------------------------" | DELETE
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This will hide the matched events from further searches but will not erase them completely from the index.&lt;/P&gt;

&lt;P&gt;Splunk by default doesn't allow users to run the command DELETE,  so go to "Access controls »   Roles » "&lt;BR /&gt;
and apply the role &lt;CODE&gt;"can_delete"&lt;/CODE&gt; to your user.&lt;/P&gt;

&lt;P&gt;Hope this works for you &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;/Santiago&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 19:28:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-specific-string-from-Splunk-event-logs-at-index/m-p/130395#M35530</guid>
      <dc:creator>santiagoaloi</dc:creator>
      <dc:date>2015-10-16T19:28:01Z</dc:date>
    </item>
  </channel>
</rss>

