Splunk Search

Regex

uagraw01
Motivator

I want to exclude this event "values='{CARD}hfgjllanabbflvh=='} from the server. Please suggest me regex for this and suggest me the props and transforms for this.

Below the sample event:

' weblogic.server values='{CARD}hfgjllanabbflvh=='}


[Sourcetype]
SHOULD_LINEMERGE = false
TRANSFORMS-mask = one

 

[one]
REGEX =
FORMAT = 
DEST_KEY = 

0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @uagraw01 ,

I think you want to filter all event that contains values='{CARD}hfgjllanabbflvh=='}  string. Please try below; 

transforms.conf

[one]
REGEX = values\='{CARD}hfgjllanabbflvh=='}
DEST_KEY = queue
FORMAT = nullQueue

 

If this reply helps you an upvote is appreciated.

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...