<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to blacklist inputs.conf? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/599082#M104474</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/52268"&gt;@garrywilmeth&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;yes, you can, as you can see in the inputs.conf documentation, you have:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist = &amp;lt;list of eventIDs&amp;gt; | key=regex [key=regex]&lt;/LI-CODE&gt;&lt;P&gt;you can blacklist an EventCode or a regex in inputs.conf.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Tue, 24 May 2022 13:27:38 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2022-05-24T13:27:38Z</dc:date>
    <item>
      <title>How to blacklist inputs.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/598999#M104458</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;DIV class=""&gt;We have a rather noisy agent that is logging about 19GB of data daily.&amp;nbsp; How can I filter the following from the inputs.conf?&lt;/DIV&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;Process&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Information:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;Process&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;ID:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;0x1450&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;Process&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Name:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;C:\Program&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Files\Rapid7\Insight&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Agent\components\insight_agent\3.1.5.14\ir_agent.exe&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;Thanks,&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;SPAN class=""&gt;Garry&lt;/SPAN&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 24 May 2022 00:33:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/598999#M104458</guid>
      <dc:creator>garrywilmeth</dc:creator>
      <dc:date>2022-05-24T00:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist inputs.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/599017#M104462</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/52268"&gt;@garrywilmeth&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;if you're speaking of Wineventlog, you can blacklist some EventCode in the inputs.conf; for more infos see at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.2.6/Admin/Inputsconf" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.2.6/Admin/Inputsconf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;In few words, put in the winevenlog stanza&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;# Filtering at the input layer is desirable to reduce the total
# processing load in network transfer and computation on the Splunk platform
# nodes that acquire and processing Event Log data.

blacklist = &amp;lt;list of eventIDs&amp;gt; | key=regex [key=regex]&lt;/LI-CODE&gt;&lt;P&gt;If instead it's another kind of data source, you have to filter your data on the Indexers or (if present) on Heavy Forwarders following the instructions at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.2.6/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.2.6/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&lt;/P&gt;&lt;P&gt;In few words, if you need to discard only some data (the ones with the string "&lt;SPAN class=""&gt;C:\Program&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Files\Rapid7\Insight&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Agent\components\insight_agent\3.1.5.14\ir_agent.exe") you have to put in props.conf:&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[source::/var/log/messages]
TRANSFORMS-null= setnull&lt;/LI-CODE&gt;&lt;P&gt;and in transforms.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = C:\\Program Files\\Rapid7\\Insight Agent\\components\\insight_agent\\3.1.5.14\\ir_agent.exe
DEST_KEY = queue
FORMAT = nullQueue&lt;/LI-CODE&gt;&lt;P&gt;and restart Splunk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 06:48:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/599017#M104462</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-05-24T06:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist inputs.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/599076#M104471</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Thank you for the reply.&amp;nbsp; Yes, the events are from the Windows Event Security log.&amp;nbsp; I don't want to filter all 4703 events coming from the windows event log, only those also containing IR_agent.exe.&amp;nbsp; As far as the path for the agent, the filename IR_agent.exe is constant where the path contains the version number and changes when the agent is upgraded.&lt;/P&gt;&lt;P&gt;Can this be done at the inputs.conf level?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Garry&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 13:12:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/599076#M104471</guid>
      <dc:creator>garrywilmeth</dc:creator>
      <dc:date>2022-05-24T13:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist inputs.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/599082#M104474</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/52268"&gt;@garrywilmeth&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;yes, you can, as you can see in the inputs.conf documentation, you have:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist = &amp;lt;list of eventIDs&amp;gt; | key=regex [key=regex]&lt;/LI-CODE&gt;&lt;P&gt;you can blacklist an EventCode or a regex in inputs.conf.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 13:27:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/599082#M104474</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-05-24T13:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist inputs.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/599106#M104480</link>
      <description>&lt;P&gt;Something like this?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist = EventCode=“4703” Message=“\\ir_agent.exe”&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 24 May 2022 15:11:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/599106#M104480</guid>
      <dc:creator>garrywilmeth</dc:creator>
      <dc:date>2022-05-24T15:11:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist inputs.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/599115#M104481</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/52268"&gt;@garrywilmeth&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;check the regex in Splunk indexed data, if this regex match the events to discard you can apply it to blacklist.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 15:40:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/m-p/599115#M104481</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-05-24T15:40:48Z</dc:date>
    </item>
  </channel>
</rss>

