Splunk Search

How to use regex to exclude events containing "session-6-305012" before indexing?

kiran331
Builder

How to use regex to exclude events containing "session-6-305012" before indexing?

sample event:

1.2.3.4 :Jul 06 20:12:40 UTC: %ASA-session-6-305012: Teardown dynamic TCP translation from inside:1.2.33.55/10447 to outside:22.33.44.55/29479 duration 0:00:30
0 Karma
1 Solution

somesoni2
Revered Legend

You need to follow instruction from below documentation. Just update REGEX per yours.

http://docs.splunk.com/Documentation/Splunk/6.5.2/Forwarding/Routeandfilterdatad#Discard_specific_ev...

REGEX = session-6-305012

View solution in original post

0 Karma

somesoni2
Revered Legend

You need to follow instruction from below documentation. Just update REGEX per yours.

http://docs.splunk.com/Documentation/Splunk/6.5.2/Forwarding/Routeandfilterdatad#Discard_specific_ev...

REGEX = session-6-305012
0 Karma
Get Updates on the Splunk Community!

Transforming Financial Data into Fraud Intelligence

Every day, banks and financial companies handle millions of transactions, logins, and customer interactions ...

How to send events & findings from AWS to Splunk using Amazon EventBridge

Amazon EventBridge is a serverless service that uses events to connect application components together, making ...

Exciting News: The AppDynamics Community Joins Splunk!

Hello Splunkers,   I’d like to introduce myself—I’m Ryan, the former AppDynamics Community Manager, and I’m ...