<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I blacklist events with a field containing a specific value? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-events-with-a-field-containing-a-specific/m-p/490913#M83908</link>
    <description>&lt;P&gt;The technique for blacklisting Windows event log data only works for Windows event log data.  To ignore other events, use props and transforms to send selected events to the NULL queue.  See &lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.3/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.3/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt; and &lt;A href="https://answers.splunk.com/answers/59370/filtering-events-using-nullqueue-1.html"&gt;https://answers.splunk.com/answers/59370/filtering-events-using-nullqueue-1.html&lt;/A&gt; .&lt;/P&gt;</description>
    <pubDate>Mon, 04 May 2020 21:06:31 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2020-05-04T21:06:31Z</dc:date>
    <item>
      <title>How do I blacklist events with a field containing a specific value?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-events-with-a-field-containing-a-specific/m-p/490912#M83907</link>
      <description>&lt;P&gt;I have a set of JSON data and I would like to ignore (blacklist) all events where the field "id.orig_h" contains the value "192.168.0.1".&lt;/P&gt;

&lt;P&gt;So far, I've tried using the blacklisting procedure for Windows EventCodes as a model, but with no success. Example EventCode blacklist:&lt;/P&gt;

&lt;P&gt;[WinEventLog:Security]&lt;BR /&gt;
blacklist1 = EventCode = "4662" Message = "Account Name:\s+(example account)"&lt;/P&gt;

&lt;P&gt;What I've tried:&lt;/P&gt;

&lt;P&gt;1) Adding the blacklist underneath the monitor stanza in inputs.conf&lt;/P&gt;

&lt;P&gt;[monitor:///opt/bro/logs/current]&lt;BR /&gt;
index = yada&lt;BR /&gt;
sourcetype = yadayada&lt;BR /&gt;
blacklist = id.orig_h = "192.168.0.1"&lt;/P&gt;

&lt;P&gt;2) Adding the blacklist under a separate sourcetype stanza in inputs.conf&lt;/P&gt;

&lt;P&gt;[monitor:///opt/bro/logs/current]&lt;BR /&gt;
index = yada&lt;BR /&gt;
sourcetype = yadayada&lt;/P&gt;

&lt;P&gt;[yadayada]&lt;BR /&gt;
blacklist = id.orig_h = "192.168.0.1"&lt;/P&gt;

&lt;P&gt;How can I achieve this?&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2020 20:45:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-events-with-a-field-containing-a-specific/m-p/490912#M83907</guid>
      <dc:creator>dbuehler</dc:creator>
      <dc:date>2020-05-04T20:45:03Z</dc:date>
    </item>
    <item>
      <title>Re: How do I blacklist events with a field containing a specific value?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-events-with-a-field-containing-a-specific/m-p/490913#M83908</link>
      <description>&lt;P&gt;The technique for blacklisting Windows event log data only works for Windows event log data.  To ignore other events, use props and transforms to send selected events to the NULL queue.  See &lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.3/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.3/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt; and &lt;A href="https://answers.splunk.com/answers/59370/filtering-events-using-nullqueue-1.html"&gt;https://answers.splunk.com/answers/59370/filtering-events-using-nullqueue-1.html&lt;/A&gt; .&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2020 21:06:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-events-with-a-field-containing-a-specific/m-p/490913#M83908</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-05-04T21:06:31Z</dc:date>
    </item>
  </channel>
</rss>

