Splunk Search

How to use regex to exclude events containing "session-6-305012" before indexing?

kiran331
Builder

How to use regex to exclude events containing "session-6-305012" before indexing?

sample event:

1.2.3.4 :Jul 06 20:12:40 UTC: %ASA-session-6-305012: Teardown dynamic TCP translation from inside:1.2.33.55/10447 to outside:22.33.44.55/29479 duration 0:00:30
0 Karma
1 Solution

somesoni2
Revered Legend

You need to follow instruction from below documentation. Just update REGEX per yours.

http://docs.splunk.com/Documentation/Splunk/6.5.2/Forwarding/Routeandfilterdatad#Discard_specific_ev...

REGEX = session-6-305012

View solution in original post

0 Karma

somesoni2
Revered Legend

You need to follow instruction from below documentation. Just update REGEX per yours.

http://docs.splunk.com/Documentation/Splunk/6.5.2/Forwarding/Routeandfilterdatad#Discard_specific_ev...

REGEX = session-6-305012
0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...