Splunk Search

How to use regex to exclude events containing "session-6-305012" before indexing?

kiran331
Builder

How to use regex to exclude events containing "session-6-305012" before indexing?

sample event:

1.2.3.4 :Jul 06 20:12:40 UTC: %ASA-session-6-305012: Teardown dynamic TCP translation from inside:1.2.33.55/10447 to outside:22.33.44.55/29479 duration 0:00:30
0 Karma
1 Solution

somesoni2
Revered Legend

You need to follow instruction from below documentation. Just update REGEX per yours.

http://docs.splunk.com/Documentation/Splunk/6.5.2/Forwarding/Routeandfilterdatad#Discard_specific_ev...

REGEX = session-6-305012

View solution in original post

0 Karma

somesoni2
Revered Legend

You need to follow instruction from below documentation. Just update REGEX per yours.

http://docs.splunk.com/Documentation/Splunk/6.5.2/Forwarding/Routeandfilterdatad#Discard_specific_ev...

REGEX = session-6-305012
0 Karma
Get Updates on the Splunk Community!

Splunk Observability Cloud’s AI Assistant in Action Series: Analyzing and ...

This is the second post in our Splunk Observability Cloud’s AI Assistant in Action series, in which we look at ...

Elevate Your Organization with Splunk’s Next Platform Evolution

 Thursday, July 10, 2025  |  11AM PDT / 2PM EDT Whether you're managing complex deployments or looking to ...

Splunk Answers Content Calendar, June Edition

Get ready for this week’s post dedicated to Splunk Dashboards! We're celebrating the power of community by ...