Splunk Search

Discarding of Events based on some column value

abhayneilam
Contributor

Hi,
I have a JSON file which has a key value pair. I want to discard the events which contains "Name":"John" ( I mean if "Name" column is having "John" value ). The events which contains this "John" name should be discarded or should not be indexed.

Please let me know the possible ways !!

Regards,
Abhay

Tags (2)
0 Karma
1 Solution

theouhuios
Motivator

Please see this

You can use regex patterns to match and set that to be dumped to nullQueue.

View solution in original post

theouhuios
Motivator

Please see this

You can use regex patterns to match and set that to be dumped to nullQueue.

abhayneilam
Contributor

Thanks It is now working ..

0 Karma
Get Updates on the Splunk Community!

Dashboard Studio Challenge - Learn New Tricks, Showcase Your Skills, and Win Prizes!

Reimagine what you can do with your dashboards. Dashboard Studio is Splunk’s newest dashboard builder to ...

Introducing Edge Processor: Next Gen Data Transformation

We get it - not only can it take a lot of time, money and resources to get data into Splunk, but it also takes ...

Take the 2021 Splunk Career Survey for $50 in Amazon Cash

Help us learn about how Splunk has impacted your career by taking the 2021 Splunk Career Survey. Last year’s ...