<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Regex match on &amp;quot;message&amp;quot; portion of event in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Regex-match-on-quot-message-quot-portion-of-event/m-p/489200#M136663</link>
    <description>&lt;P&gt;Hi @montydo,&lt;BR /&gt;
let me understand: do you want to exclude from indexing all the events where there's the string "C:\Program Files\Veeam\Backup and Replication\Console\veeam.backup.shell.exe" ?&lt;BR /&gt;
if this is your need you should use something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 0
start_from = newest
blacklist1 = C:\\Program Files\\Veeam\\Backup and Replication\\Console\\veeam.backup\.shell\.exe
index = wineventlog
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;otherwise, you can filter these events on Indexers before indexing (see at &lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.1/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.1/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt; ) using the same regex.&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
    <pubDate>Mon, 20 Jan 2020 12:07:43 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2020-01-20T12:07:43Z</dc:date>
    <item>
      <title>Regex match on "message" portion of event</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-match-on-quot-message-quot-portion-of-event/m-p/489199#M136662</link>
      <description>&lt;P&gt;From the splunk windows_TA guide&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;"The following keys are equivalent to the fields which appear in the text of
the acquired events: Category CategoryString ComputerName EventCode
EventType Keywords LogName **Message** OpCode RecordNumber Sid SidType
SourceName TaskCategory Type User"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm trying to filter on the contents of the "Message" field:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;An operation was attempted on a privileged object. Subject: Security ID:    ROOT\username Account Name: username Account Domain:    DOMAINNAME Logon ID:    0x200ABCD1 Object: Object Server:   Security Object Type:   - Object Name:  - Object Handle: 0x1234 Process Information: Process ID:    0x12A3 Process Name:    **C:\Program Files\Veeam\Backup and Replication\Console\veeam.backup.shell.exe** Requested Operation: Desired Access:   1234567 Privileges: SeTakeOwnershipPrivilege
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm looking to match on the "&lt;STRONG&gt;C:\Program Files\Veeam\Backup and Replication\Console\veeam.backup.shell.exe&lt;/STRONG&gt;" portion and discard the events through a blacklist stanza in the inputs.conf on the Universal Forwarder.&lt;/P&gt;

&lt;P&gt;Something like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist3 = | key=regex [key=REGEXHERE?]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Is this possible? and can anyone help with the regex?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 11:04:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-match-on-quot-message-quot-portion-of-event/m-p/489199#M136662</guid>
      <dc:creator>montydo</dc:creator>
      <dc:date>2020-01-20T11:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: Regex match on "message" portion of event</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-match-on-quot-message-quot-portion-of-event/m-p/489200#M136663</link>
      <description>&lt;P&gt;Hi @montydo,&lt;BR /&gt;
let me understand: do you want to exclude from indexing all the events where there's the string "C:\Program Files\Veeam\Backup and Replication\Console\veeam.backup.shell.exe" ?&lt;BR /&gt;
if this is your need you should use something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 0
start_from = newest
blacklist1 = C:\\Program Files\\Veeam\\Backup and Replication\\Console\\veeam.backup\.shell\.exe
index = wineventlog
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;otherwise, you can filter these events on Indexers before indexing (see at &lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.1/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.1/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt; ) using the same regex.&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 12:07:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-match-on-quot-message-quot-portion-of-event/m-p/489200#M136663</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-01-20T12:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: Regex match on "message" portion of event</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-match-on-quot-message-quot-portion-of-event/m-p/489201#M136664</link>
      <description>&lt;P&gt;Try this for your blacklisting.&lt;BR /&gt;
Make sure you escape your backslashes and your dots as they would be interpreted as wildcards.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist3 = Message="Process Name:\s+\*\*C:\\Program Files\\Veeam\\Backup and Replication\\Console\\veeam\.backup\.shell\.exe"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 20 Jan 2020 12:09:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-match-on-quot-message-quot-portion-of-event/m-p/489201#M136664</guid>
      <dc:creator>damann</dc:creator>
      <dc:date>2020-01-20T12:09:24Z</dc:date>
    </item>
  </channel>
</rss>

