<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Blacklist RegEx Parsing in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628550#M218335</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;So, here is my revised inputs.conf based on your feedback:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog://Microsoft-Windows-PowerShell/Operational]
disabled = 0
index = windows
evt_resolve_ad_obj = 1
checkpointInterval = 5
renderXml = false
whitelist = 4103,4104

blacklist.1 = EventCode="4103" Message="SplunkUniversalForwarder\\bin\\splunk-powershell"&lt;/LI-CODE&gt;&lt;P&gt;However, this log is still being indexed:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Untitled.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/23589i4C6C05670A5EAB92/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 26 Jan 2023 21:40:39 GMT</pubDate>
    <dc:creator>qcjacobo2577</dc:creator>
    <dc:date>2023-01-26T21:40:39Z</dc:date>
    <item>
      <title>How to blacklist regex in parsing?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628356#M218268</link>
      <description>&lt;P&gt;Currently running Splunk Universal Forwarder version 9.0.3.&lt;/P&gt;
&lt;P&gt;Looking to ignore Windows event logs (EventCode = 4103) using a "&lt;EM&gt;&lt;STRONG&gt;blacklist&lt;/STRONG&gt;&lt;/EM&gt;" approach as part of my overall &lt;EM&gt;&lt;STRONG&gt;inputs.conf&lt;/STRONG&gt;&lt;/EM&gt; configuration.&amp;nbsp; While the splunkd.log is not throwing any errors with my current attempts, it is also not ignoring logs containing the string:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;String: to Ignore: &lt;STRONG&gt;C:\WINDOWS\CCM\SystemTemp.&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;I am choosing to filter on the string above as other aspects can vary and this is the common string that is included in the events I want to ignore.&amp;nbsp; Below an example of such log.&amp;nbsp; Please advise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My attempt at this is:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;blacklist1 = EventCode="4103" Message="(?:Host Application =)\s+(?:.*WINDOWS\\CCM\\SystemTemp\\+.*)"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;User=SYSTEM
Sid=S-1-5-18
SidType=1
SourceName=Microsoft-Windows-PowerShell
Type=Information
RecordNumber=10132121
Keywords=None
TaskCategory=Executing Pipeline
OpCode=To be used when operation is just executing a method
Message=CommandInvocation(Out-Default): "Out-Default"


Context:
        Severity = Informational
        Host Name = ConsoleHost
        Host Version = 5.1.19041.2364
        Host ID = 5009593d-812d-49fc-a794-4633cf58cd5c
        Host Application = C:\WINDOWS\system32\WindowsPowerShell\v1.0\PowerShell.exe -NoLogo -Noninteractive -NoProfile -ExecutionPolicy Bypass &amp;amp; 'C:\WINDOWS\CCM\SystemTemp\7f1a326f-19f5-4480-9414-46ffe015e730.ps1'
        Engine Version = 5.1.19041.2364&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 16:53:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628356#M218268</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2023-01-27T16:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628362#M218271</link>
      <description>&lt;P&gt;I'm guessing the regex isn't working for you or you wouldn't have posted here.&amp;nbsp; What I can't guess at, however, is what is happening instead.&amp;nbsp; Are all events deleted, some of them deleted, none of them deleted, or something else?&lt;/P&gt;&lt;P&gt;From a regex perspective, the capture groups are unnecessary as are the trailing &lt;FONT face="courier new,courier"&gt;.*&lt;/FONT&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 01:20:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628362#M218271</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-01-26T01:20:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628372#M218272</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;Definitely not working as-is.&amp;nbsp; I have tried several different iterations of this using a variety of syntax.&amp;nbsp; In some cases the events continue to flow in as if I had not applied any filtering and in other cases no events with code 4103 come in at all (even though I am not targeting such a broad set of data).&amp;nbsp; I just can't seem to get it right and was hoping there was an easy answer.&lt;/P&gt;&lt;P&gt;Alternatively, I am open to using ingest actions --- but am less familair with using those.&amp;nbsp; Does using these only affect my license or would this approach prevent the data from being indexed at all (to whatever would have been the destination index in the first place)?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My goal here is that these events are in the end not searchable via the destination index at all.&lt;/P&gt;&lt;P&gt;If ingest actions are not going to get me to my end state, I am back to using blacklists and am hoping for some ideas.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 02:22:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628372#M218272</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2023-01-26T02:22:09Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628419#M218277</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/235933"&gt;@qcjacobo2577&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Can you try as blacklist3 ? If you are sending Splunk_TA_windows to UF it has already blacklist1 defined.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist3 = EventCode="4103" Message="(?:Host Application =)\s+(?:.*WINDOWS\\CCM\\SystemTemp\\+.*)"&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 26 Jan 2023 05:26:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628419#M218277</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2023-01-26T05:26:03Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628464#M218293</link>
      <description>&lt;P&gt;Ingest Actions move the filtering from the UF to the indexer.&amp;nbsp; They may help or they may just move the problem to a different server.&lt;/P&gt;&lt;P&gt;Data filtered by an Ingest Action would not count against your license because it would not be indexed.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 13:28:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628464#M218293</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-01-26T13:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628469#M218295</link>
      <description>&lt;P&gt;If I remember correctly, you specify blacklist entries as as field=raw_regex, without putting the regex i&amp;nbsp; quotes. If you specify EventCode="4103", you're looking for a regex containing a quote, literal 4103 and a quote. (That's also why you might have to escape "=" if contained within a regex).&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 13:43:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628469#M218295</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-01-26T13:43:20Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628473#M218297</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;The regex has to be delimited, but any character can be used, not just quotes.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 13:55:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628473#M218297</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-01-26T13:55:27Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628490#M218306</link>
      <description>&lt;P&gt;Yeah, sorry. I verified it with default inputs.conf from TA-windows and you're right. I must have mistaken it with something else &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt; It's not my day, apparently..&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 14:47:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628490#M218306</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-01-26T14:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628536#M218328</link>
      <description>&lt;P&gt;All --- thank you for your insight thus far.&amp;nbsp; Unfortunately, the issue still persists despite trying a number of different approaches.&amp;nbsp; The current blacklists (included in the screenshot below) are successful in that they are able to filter out events (such as those shown in the sample log --- also shown below).&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: I do not have the Windows TA installed on the endpoint on which this blacklist is published (only upstream on my HA and Splunk Cloud hosted environment).&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;inputs.conf&amp;nbsp;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog://Microsoft-Windows-PowerShell/Operational]
disabled = 0
index = windows
evt_resolve_ad_obj = 1
checkpointInterval = 5
renderXml = false
whitelist = 4103,4104

blacklist1 = EventCode="4103" "+*SplunkUniversalForwarder\\bin\\splunk-powershell*+"
blacklist2 = EventCode="4104" "+*SplunkUniversalForwarder\\bin\\splunk-powershell*+"&lt;/LI-CODE&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&amp;nbsp;Log&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;01/26/2023 09:57:53 AM
LogName=Microsoft-Windows-PowerShell/Operational
EventCode=4104
EventType=5
ComputerName=COMPUTER.acme.corp
User=SYSTEM
Sid=S-1-5-18
SidType=1
SourceName=Microsoft-Windows-PowerShell
Type=Verbose
RecordNumber=10689125
Keywords=None
TaskCategory=Execute a Remote Command
OpCode=On create calls
Message=Creating Scriptblock text (1 of 1):
{
            [void]$batch.Add($_)
            if ($batch.Count -ge $batchSize) {
                $batchAndStanza = [System.Tuple]::Create($batch.ToArray(), $stanza)
                [void]$serializingQueue.Add($batchAndStanza)
                [void]$batch.Clear()
            }
        }

ScriptBlock ID: b3e9c4de-ea6b-445a-a3af-31131f9337a7
Path: C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell-common.ps1&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where this strategy falls apart is with the log example below where the field containing this data contains other data as well (not just the file path in question).&amp;nbsp; Is there an approach here with regards to RegEx and blacklisting that will work?&amp;nbsp; If so, can you provide such?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;01/26/2023 11:06:05 AM
LogName=Microsoft-Windows-PowerShell/Operational
EventCode=4103
EventType=4
ComputerName=COMPUTER.acme.corp
User=SYSTEM
Sid=S-1-5-18
SidType=1
SourceName=Microsoft-Windows-PowerShell
Type=Information
RecordNumber=10710308
Keywords=None
TaskCategory=Executing Pipeline
OpCode=To be used when operation is just executing a method
Message=CommandInvocation(Start-Sleep): "Start-Sleep"
ParameterBinding(Start-Sleep): name="Milliseconds"; value="200"


Context:
        Severity = Informational
        Host Name = ConsoleHost
        Host Version = 5.1.19041.2364
        Host ID = 669eaf0a-e3f8-4a4a-ba5c-07aaa7cbf8bf
        Host Application = powershell.exe -command &amp;amp; {get-content C:\WINDOWS\TEMP\\input20898122fee20402.tmp | C:\Program` Files\SplunkUniversalForwarder\bin\splunk-powershell.ps1  C:\Program` Files\SplunkUniversalForwarder  20898122fee20402}
        Engine Version = 5.1.19041.2364
        Runspace ID = 5291985e-c02c-4052-9465-91ab0c5a7989
        Pipeline ID = 1
        Command Name = Start-Sleep
        Command Type = Cmdlet
        Script Name = 
        Command Path = 
        Sequence Number = 47702
        User = ACME\SYSTEM
        Connected User = 
        Shell ID = Microsoft.PowerShell&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 19:08:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628536#M218328</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2023-01-26T19:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628538#M218329</link>
      <description>&lt;P&gt;And this blacklist works without specifying key for the regex? I'm surprised. Spec says it is key=regex format&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/admin/inputsconf#Event_Log_filtering" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/admin/inputsconf#Event_Log_filtering&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 19:37:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628538#M218329</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-01-26T19:37:25Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628540#M218331</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;Short answer is yes --- the logs for those events do not show up in an indexed search.&amp;nbsp; splunkd.log does throw an error stating what you are referring to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;01-26-2023 09:57:45.534 -0800 ERROR ExecProcessor [25044 ExecProcessor] - message from ""C:\Program Files\SplunkUniversalForwarder\bin\splunk-winevtlog.exe"" splunk-winevtlog - Processing: 'blacklist1', failed to find key in string data ' "+*SplunkUniversalForwarder\\bin\\splunk-powershell*+"'&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas as to the correct regex logic to filter the issue I am facing?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 20:11:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628540#M218331</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2023-01-26T20:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628543#M218333</link>
      <description>&lt;P&gt;As it is key=regex, the blacklist entry should say something like&lt;/P&gt;&lt;PRE&gt;blacklist.1 = EventCode="4103" Message="SplunkUniversalForwarder\\bin\\splunk-powershell"&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 20:44:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628543#M218333</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-01-26T20:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628550#M218335</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;So, here is my revised inputs.conf based on your feedback:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog://Microsoft-Windows-PowerShell/Operational]
disabled = 0
index = windows
evt_resolve_ad_obj = 1
checkpointInterval = 5
renderXml = false
whitelist = 4103,4104

blacklist.1 = EventCode="4103" Message="SplunkUniversalForwarder\\bin\\splunk-powershell"&lt;/LI-CODE&gt;&lt;P&gt;However, this log is still being indexed:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Untitled.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/23589i4C6C05670A5EAB92/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 21:40:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628550#M218335</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2023-01-26T21:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628584#M218353</link>
      <description>&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/admin/inputsconf#Event_Log_filtering" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/Splunk/latest/admin/inputsconf#Event_Log_filtering&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You have&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist.1 = EventCode="4103" Message="SplunkUniversalForwarder\\bin\\splunk-powershell"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where you should have&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist1 = EventCode="4103" Message="SplunkUniversalForwarder\\bin\\splunk-powershell"&lt;/LI-CODE&gt;&lt;P&gt;(yeah, I didn't check the key name myself; just checked the value before).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 08:52:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628584#M218353</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-01-27T08:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Blacklist RegEx Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628634#M218371</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;That seems to work. Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 15:55:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-regex-in-parsing/m-p/628634#M218371</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2023-01-27T15:55:48Z</dc:date>
    </item>
  </channel>
</rss>

