Splunk Search

How to exclude lines from a log --IndexQueue

IreneAsdfgk
Engager

We are trying to index only events that contain a certain structure set by a regular expression: \ S + \ s \ S + \ s \ ((\ S + | \ w + | ./ \ w +) ) : \ s (DATE | END | Running).
However, when we assign the indexQueue property in transforms.conf, it doesn't work:

[takedata]
REGEX = \ S + \ s \ S + \ s \ ((\ S + | \ w + | ./ \ w +) \) \: \ s (DATE | END | Running)
DEST_KEY = queue
FORMAT = indexQueue

If we do it with the nullQueue, we exclude the rows that correspond to that expression.

[excludedata]
REGEX = \ S + \ s \ S + \ s \ ((\ S + | \ w + | ./ \ w +) \) \: \ s (DATE | END | Running)
DEST_KEY = queue
FORMAT = nullQueue

Can any help us?

Thanks.

0 Karma
1 Solution

oscar84x
Contributor

You need to do both and in the specific order as explained in the link below. What this does is "send everything to the nullQueue, except the events that match this regex". Like this:

[your_sourcetype]
TRANSFORMS-set= excludedata,takedata

[excludedata]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[takedata]
REGEX = \ S + \ s \ S + \ s \ ((\ S + | \ w + | ./ \ w +) ) : \ s (DATE | END | Running)
DEST_KEY = queue
FORMAT = indexQueue

https://docs.splunk.com/Documentation/SplunkCloud/8.0.0/Forwarding/Routeandfilterdatad#Filter_event_...

View solution in original post

oscar84x
Contributor

You need to do both and in the specific order as explained in the link below. What this does is "send everything to the nullQueue, except the events that match this regex". Like this:

[your_sourcetype]
TRANSFORMS-set= excludedata,takedata

[excludedata]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[takedata]
REGEX = \ S + \ s \ S + \ s \ ((\ S + | \ w + | ./ \ w +) ) : \ s (DATE | END | Running)
DEST_KEY = queue
FORMAT = indexQueue

https://docs.splunk.com/Documentation/SplunkCloud/8.0.0/Forwarding/Routeandfilterdatad#Filter_event_...

IreneAsdfgk
Engager

'in the specific order ' has been the key for resolution. Thanks you very much!!!!!!!!

0 Karma

rashi83
Path Finder

@oscar84x @IreneAsdfgk

Can you let me know if you tweaked outputs.conf too ?
I am facing same issue - I can't filter in events to include events but exclude filter works. My config is running on standalone SH .
I added in outputs.conf too - how can I make it work ?

[tcpout:setparsing]
server=localhost:8000

Props.conf
[OktaIM2:log]
TRANSFORMS-set= setnull,setparsing

transforms.conf
[setnull]
REGEX=gmail.com
DEST_KEY=queue
FORMAT=nullQueue
[setparsing]
REGEX=yahoo.com
DEST_KEY=queue
FORMAT=indexQueue

0 Karma

oscar84x
Contributor

Excellent! Glad to help. If you have a chance please mark the answer as accepted.
Thank you.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...

Keep the Learning Going with the New Best of .conf Hub

Hello Splunkers, With .conf26 getting closer, there’s already a lot of excitement building around this year’s ...