<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows inputs.conf blacklist testing process in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Windows-inputs-conf-blacklist-testing-process/m-p/500484#M85296</link>
    <description>&lt;P&gt;Hi @adalbor,&lt;/P&gt;

&lt;P&gt;This is very well details here :&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.0/Data/MonitorWindowseventlogdata#Configuration_settings_for_monitoring_Windows_Event_Logs"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.0/Data/MonitorWindowseventlogdata#Configuration_settings_for_monitoring_Windows_Event_Logs&lt;/A&gt;&lt;BR /&gt;
Have a look at the &lt;CODE&gt;blacklist&lt;/CODE&gt; section there.&lt;/P&gt;

&lt;P&gt;You can even find advanced configurations and examples here : &lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.0/Data/MonitorWindowseventlogdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.0/Data/MonitorWindowseventlogdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;You can use an example event from Splunk to test your regex. After searching for the event you wish to test out, add &lt;CODE&gt;|table _raw&lt;/CODE&gt; to your query to see the raw log line.&lt;/P&gt;

&lt;P&gt;Let me know if you need more details.&lt;/P&gt;

&lt;P&gt;Cheers,&lt;BR /&gt;
David&lt;/P&gt;</description>
    <pubDate>Tue, 03 Dec 2019 16:22:28 GMT</pubDate>
    <dc:creator>DavidHourani</dc:creator>
    <dc:date>2019-12-03T16:22:28Z</dc:date>
    <item>
      <title>Windows inputs.conf blacklist testing process</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-inputs-conf-blacklist-testing-process/m-p/500483#M85295</link>
      <description>&lt;P&gt;Does anyone out there have a best practice for testing Windows event inputs.conf blacklist entries?&lt;/P&gt;

&lt;P&gt;What actual event/part of the event is used for testing? The data in the splunk event gathered from a search? Or am I going straight to the windows box and copying the text from the General tab or the Friendly view?&lt;/P&gt;

&lt;P&gt;I use regex101 and regexr and even sublime when needed to test regex's but I feel like looking through multiple posts everyone achieves their goals a little bit differently.&lt;/P&gt;

&lt;P&gt;Would be great if Splunk provided a step by step document on how best to achieve this and ensure it works.&lt;/P&gt;

&lt;P&gt;Thanks, &lt;BR /&gt;
Andrew&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 16:14:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-inputs-conf-blacklist-testing-process/m-p/500483#M85295</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2019-12-03T16:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: Windows inputs.conf blacklist testing process</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-inputs-conf-blacklist-testing-process/m-p/500484#M85296</link>
      <description>&lt;P&gt;Hi @adalbor,&lt;/P&gt;

&lt;P&gt;This is very well details here :&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.0/Data/MonitorWindowseventlogdata#Configuration_settings_for_monitoring_Windows_Event_Logs"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.0/Data/MonitorWindowseventlogdata#Configuration_settings_for_monitoring_Windows_Event_Logs&lt;/A&gt;&lt;BR /&gt;
Have a look at the &lt;CODE&gt;blacklist&lt;/CODE&gt; section there.&lt;/P&gt;

&lt;P&gt;You can even find advanced configurations and examples here : &lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.0/Data/MonitorWindowseventlogdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.0/Data/MonitorWindowseventlogdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;You can use an example event from Splunk to test your regex. After searching for the event you wish to test out, add &lt;CODE&gt;|table _raw&lt;/CODE&gt; to your query to see the raw log line.&lt;/P&gt;

&lt;P&gt;Let me know if you need more details.&lt;/P&gt;

&lt;P&gt;Cheers,&lt;BR /&gt;
David&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 16:22:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-inputs-conf-blacklist-testing-process/m-p/500484#M85296</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-12-03T16:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: Windows inputs.conf blacklist testing process</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-inputs-conf-blacklist-testing-process/m-p/500485#M85297</link>
      <description>&lt;P&gt;Thanks for the advice on using the _raw.&lt;/P&gt;

&lt;P&gt;I've looked at the official documentation quite a few times and there is still left to be desired.  It  goes into some simple use cases but nothing actually advanced in my opinion.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 16:29:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-inputs-conf-blacklist-testing-process/m-p/500485#M85297</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2019-12-03T16:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: Windows inputs.conf blacklist testing process</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-inputs-conf-blacklist-testing-process/m-p/500486#M85298</link>
      <description>&lt;P&gt;yeah.. It's called advanced in the documentation, but as usual the "advanced" that is documented is only there to help build things... surely nothing compared to what you can do with ninja skills and good imagination. &lt;/P&gt;

&lt;P&gt;Anyway let me know if you still anything else and please accept the answer if it was helpful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 16:33:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-inputs-conf-blacklist-testing-process/m-p/500486#M85298</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-12-03T16:33:31Z</dc:date>
    </item>
  </channel>
</rss>

