<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic inputs.conf whitelist blacklist question in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/inputs-conf-whitelist-blacklist-question/m-p/150484#M30593</link>
    <description>&lt;P&gt;Greetings&lt;/P&gt;

&lt;P&gt;I have trying to gather logs by sifting through three levels of the file system with a white list and blacklist. It is not working and outside of creating a very long list of monitors I am not sure what to do anymore.&lt;/P&gt;

&lt;P&gt;Any help is much appreciated.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;

&lt;P&gt;My config&lt;/P&gt;

&lt;P&gt;[monitor:///opt/transient/prod/data/xxxxxx/xxx/xx_ci/log/]&lt;BR /&gt;
recursive = true&lt;BR /&gt;
sourcetype=prd_xxx_xx_log&lt;BR /&gt;
disabled = false&lt;BR /&gt;
crcSalt = &lt;SOURCE&gt;&lt;BR /&gt;
whitelist = .dat$|.log$|.err$|.txt$&lt;BR /&gt;
blacklist = .gz$&lt;/SOURCE&gt;&lt;/P&gt;

&lt;P&gt;[monitor:///opt/transient/prod/data/xxxxxx/xxx/xxx_ci/error/]&lt;BR /&gt;
recursive = true&lt;BR /&gt;
sourcetype=prd_xxx_xx_error&lt;BR /&gt;
disabled = false&lt;BR /&gt;
crcSalt = &lt;SOURCE&gt;&lt;BR /&gt;
whitelist = .dat$|.log$|.err$|.txt$&lt;BR /&gt;
blacklist = .gz$&lt;/SOURCE&gt;&lt;/P&gt;

&lt;P&gt;Any ideas?&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 16:31:24 GMT</pubDate>
    <dc:creator>ebailey</dc:creator>
    <dc:date>2020-09-28T16:31:24Z</dc:date>
    <item>
      <title>inputs.conf whitelist blacklist question</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/inputs-conf-whitelist-blacklist-question/m-p/150484#M30593</link>
      <description>&lt;P&gt;Greetings&lt;/P&gt;

&lt;P&gt;I have trying to gather logs by sifting through three levels of the file system with a white list and blacklist. It is not working and outside of creating a very long list of monitors I am not sure what to do anymore.&lt;/P&gt;

&lt;P&gt;Any help is much appreciated.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;

&lt;P&gt;My config&lt;/P&gt;

&lt;P&gt;[monitor:///opt/transient/prod/data/xxxxxx/xxx/xx_ci/log/]&lt;BR /&gt;
recursive = true&lt;BR /&gt;
sourcetype=prd_xxx_xx_log&lt;BR /&gt;
disabled = false&lt;BR /&gt;
crcSalt = &lt;SOURCE&gt;&lt;BR /&gt;
whitelist = .dat$|.log$|.err$|.txt$&lt;BR /&gt;
blacklist = .gz$&lt;/SOURCE&gt;&lt;/P&gt;

&lt;P&gt;[monitor:///opt/transient/prod/data/xxxxxx/xxx/xxx_ci/error/]&lt;BR /&gt;
recursive = true&lt;BR /&gt;
sourcetype=prd_xxx_xx_error&lt;BR /&gt;
disabled = false&lt;BR /&gt;
crcSalt = &lt;SOURCE&gt;&lt;BR /&gt;
whitelist = .dat$|.log$|.err$|.txt$&lt;BR /&gt;
blacklist = .gz$&lt;/SOURCE&gt;&lt;/P&gt;

&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:31:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/inputs-conf-whitelist-blacklist-question/m-p/150484#M30593</guid>
      <dc:creator>ebailey</dc:creator>
      <dc:date>2020-09-28T16:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: inputs.conf whitelist blacklist question</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/inputs-conf-whitelist-blacklist-question/m-p/150485#M30594</link>
      <description>&lt;P&gt;Yes! Ditch the blacklist. You only need the whitelist. You also don't need the &lt;CODE&gt;recursive&lt;/CODE&gt; - that's the default.&lt;/P&gt;

&lt;P&gt;Finally - why do you have the crcSalt? &lt;/P&gt;</description>
      <pubDate>Fri, 02 May 2014 16:22:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/inputs-conf-whitelist-blacklist-question/m-p/150485#M30594</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2014-05-02T16:22:44Z</dc:date>
    </item>
    <item>
      <title>Re: inputs.conf whitelist blacklist question</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/inputs-conf-whitelist-blacklist-question/m-p/150486#M30595</link>
      <description>&lt;P&gt;Thanks!&lt;/P&gt;

&lt;P&gt;I use crcSalt with the expectation it is going to be needed. I pulled it out.&lt;/P&gt;

&lt;P&gt;Question - I made the changes you recommended and the results look good except now I am picking up files such as &lt;/P&gt;

&lt;P&gt;test.dat.lock also I am picking up all . files such as &lt;/P&gt;

&lt;P&gt;.work&lt;/P&gt;

&lt;P&gt;Any ideas?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;

&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Mon, 05 May 2014 11:10:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/inputs-conf-whitelist-blacklist-question/m-p/150486#M30595</guid>
      <dc:creator>ebailey</dc:creator>
      <dc:date>2014-05-05T11:10:21Z</dc:date>
    </item>
    <item>
      <title>Re: inputs.conf whitelist blacklist question</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/inputs-conf-whitelist-blacklist-question/m-p/150487#M30596</link>
      <description>&lt;P&gt;why to give 'blacklist' of Specific extensions of compressed files to exclude, where splunk already ignores..&lt;/P&gt;

&lt;P&gt;packed_extensions_list:&lt;BR /&gt;
bz, bz2, tbz, tbz2, Z, gz, tgz, tar, zip&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 17:35:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/inputs-conf-whitelist-blacklist-question/m-p/150487#M30596</guid>
      <dc:creator>neelamssantosh</dc:creator>
      <dc:date>2020-09-28T17:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: inputs.conf whitelist blacklist question</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/inputs-conf-whitelist-blacklist-question/m-p/150488#M30597</link>
      <description>&lt;P&gt;hmmm, this &lt;CODE&gt;packed_extensions_list&lt;/CODE&gt; is an option to crawl.conf only &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.1.3/admin/Crawlconf"&gt;http://docs.splunk.com/Documentation/Splunk/6.1.3/admin/Crawlconf&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;and here would be the correct statement regarding compressed files from &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.1.3/Data/MonitorFilesandDirectories"&gt;http://docs.splunk.com/Documentation/Splunk/6.1.3/Data/MonitorFilesandDirectories&lt;/A&gt;&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Splunk Enterprise decompresses archive files before it indexes them. It can handle these common archive file types: tar, gz, bz2, tar.gz, tgz, tbz, bz2, zip, and z.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 16 Sep 2014 11:04:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/inputs-conf-whitelist-blacklist-question/m-p/150488#M30597</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2014-09-16T11:04:02Z</dc:date>
    </item>
  </channel>
</rss>

