<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Universal Forwarder blacklist - Can anyone help with a simple regex? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220919#M64916</link>
    <description>&lt;P&gt;What was the solution in the end? &lt;/P&gt;</description>
    <pubDate>Thu, 08 Mar 2018 13:35:22 GMT</pubDate>
    <dc:creator>gerald_contrera</dc:creator>
    <dc:date>2018-03-08T13:35:22Z</dc:date>
    <item>
      <title>Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220892#M64889</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;

&lt;P&gt;On my Universal Forwarder, I'm able to effectively blacklist Windows event codes when I do it based on the EventCode field.  However, when I try to add regex to my blacklist entries it doesn't work.&lt;/P&gt;

&lt;P&gt;Essentially, I want to reduce the number of EventCode=4688 entries where the "New Process Name" field is coming from the Splunk client.  So let's say, I want to blacklist events where the EventCode=4688 and the New Process Name contains "splunk-winprintmon.exe".&lt;/P&gt;

&lt;P&gt;Here's the contents of the actual event:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;01/07/2016 12:38:09 PM
LogName=Security
SourceName=Microsoft Windows security auditing.
EventCode=4688
EventType=0
Type=Information
ComputerName=BBLAPTOP.local
TaskCategory=Process Creation
OpCode=Info
RecordNumber=8541755
Keywords=Audit Success
Message=A new process has been created.

Subject:
    Security ID:        NT AUTHORITY\SYSTEM
    Account Name:       BBLAPTOP$
    Account Domain:     LOCAL
    Logon ID:       0x3e7

Process Information:
    New Process ID:     0x6c18
    New Process Name:   C:\Program Files\SplunkUniversalForwarder\bin\splunk-winprintmon.exe
    Token Elevation Type:   TokenElevationTypeDefault (1)
    Creator Process ID: 0x2108
    Process Command Line:   
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I've been able to get "matching" regexes created when I try it out on a website like regexpal.com.  The regex below matches the event text just fine on their site, but does not work with the Splunk forwarder:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(?msi)^EventCode=(4688).*^.*New Process Name:\s+.*(splunk-winprintmon\.exe).*
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;My inputs.conf contains:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist3 = (?msi)^EventCode=(4688).*^.*New Process Name:\s+.*(splunk-winprintmon\.exe).*
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I've also tried it without the leading (?msi)^ and was not successful.  I really need to reduce my licensing volume as I'm frequently in violation, so if anyone has any ideas or solutions I would greatly appreciate it!&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 17:57:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220892#M64889</guid>
      <dc:creator>baf879</dc:creator>
      <dc:date>2016-01-07T17:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220893#M64890</link>
      <description>&lt;P&gt;If you are having trouble with this on the forwarder, why not do this on the indexer instead? The indexer is capable of handling more advanced criteria - and it will &lt;STRONG&gt;not&lt;/STRONG&gt; affect your license. The following example will eliminate the events before they are indexed:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[sourcetypeNameofEventLog]
TRANSFORMS-eliminate = remove_winprintmon
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[remove_winprintmon]
SOURCE=_raw
REGEX= (?msi)^EventCode=(4688).*^.*New Process Name:\s+.*(splunk-winprintmon\.exe)
DEST=queue
FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This will pull matching events from the index queue and trash them. Note that the transform will only run against the inbound data that matches the sourcetype. BTW, regexes in transforms.conf are unanchored by default, so you don't need the &lt;CODE&gt;.*&lt;/CODE&gt; at the end...&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 19:31:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220893#M64890</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2016-01-07T19:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220894#M64891</link>
      <description>&lt;P&gt;Try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist3=(?msi)EventCode=(4688).*^.*New Process Name:\s+.*(splunk-winprintmon\.exe).*
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The carat (^) you were using between (?msi) and EventCode is causing a matching problem.  EventCode does not appear at the beginning of your event, its the 5th line.  &lt;/P&gt;

&lt;P&gt;Also, make sure your blacklists are sequential.  For example, you should go:&lt;/P&gt;

&lt;P&gt;blacklist1&lt;BR /&gt;
blacklist2&lt;BR /&gt;
blacklist3&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;not&lt;/EM&gt;&lt;/STRONG&gt; &lt;/P&gt;

&lt;P&gt;blacklist1&lt;BR /&gt;
blacklist3&lt;BR /&gt;
blacklist4&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 19:32:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220894#M64891</guid>
      <dc:creator>jchampagne_splu</dc:creator>
      <dc:date>2016-01-07T19:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220895#M64892</link>
      <description>&lt;P&gt;Try using a Transform (on Indexer) to filter the events before indexing (and save on license)&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.0/Forwarding/Routeandfilterdatad#Filter_WMI_and_Event_Log_events"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.0/Forwarding/Routeandfilterdatad#Filter_WMI_and_Event_Log_events&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 19:42:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220895#M64892</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-01-07T19:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220896#M64893</link>
      <description>&lt;P&gt;Thanks.  I am actually doing this at the indexer currently (for  EventCode 4688 where my 3rd party inventory agent is being chatty).  My license usage dropped significantly (by half), however, I started seeing some indexing latency.  I was trying to eliminate this as a potential cause by pushing it out to the clients.  Not sure if it really would cause the latency but figured it was worth investigating.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 19:47:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220896#M64893</guid>
      <dc:creator>baf879</dc:creator>
      <dc:date>2016-01-07T19:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220897#M64894</link>
      <description>&lt;P&gt;baf879, as a few people have mentioned, you can also use nullQueue routing on the indexer...however, what you're attempting to accomplish is entirely possible via the method you're using.  We just need to fix the RegEx matching for it to work.  Let's keep the filtering as close to the data as possible...out on the Universal Forwarder.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 19:47:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220897#M64894</guid>
      <dc:creator>jchampagne_splu</dc:creator>
      <dc:date>2016-01-07T19:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220898#M64895</link>
      <description>&lt;P&gt;Thanks.  I am actually doing this at the indexer currently (for  EventCode 4688 where my 3rd party inventory agent is being chatty).  My license usage dropped significantly (by half), however, I started seeing some indexing latency.  I was trying to eliminate this as a potential cause by pushing it out to the clients.  Not sure if it really would cause the latency but figured it was worth investigating. &lt;/P&gt;

&lt;P&gt;Thank you for the tip regarding the .* at the end, I'll go in and remove that.  There's one more thing I learned about regex today !&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 19:50:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220898#M64895</guid>
      <dc:creator>baf879</dc:creator>
      <dc:date>2016-01-07T19:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220899#M64896</link>
      <description>&lt;P&gt;OK great.  Let me try removing that carat.  My blacklist items are sequential (thanks for the reminder) - this one in particular was #3 on my list.  The two preceding it were for Active Directory (4662 and 566); my Splunk PS engineer put that stanza there when she set up our Splunk cluster.&lt;/P&gt;

&lt;P&gt;The blacklist section actually looks like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist = 4656,5145,4985,4904,4905,4945,4957,5033,5024,5058,5440,5441,5442,5444,5632,6281,5031,5145
blacklist1 = EventCode="4662" Message="Object Type:\s+(?!groupPolicyContainer)"
blacklist2 = EventCode="566" Message="Object Type:\s+(?!groupPolicyContainer)"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 07 Jan 2016 19:54:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220899#M64896</guid>
      <dc:creator>baf879</dc:creator>
      <dc:date>2016-01-07T19:54:39Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220900#M64897</link>
      <description>&lt;P&gt;Ok, that looks good...except that I doubt the RegEx in blacklist1 and blacklist2 will match anything&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 19:59:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220900#M64897</guid>
      <dc:creator>jchampagne_splu</dc:creator>
      <dc:date>2016-01-07T19:59:30Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220901#M64898</link>
      <description>&lt;P&gt;It looks like your blacklist3 suggestion might have gotten messed up, as it's missing some asterisks that I had.  Unless you purposely left them out...so should blacklist3 actually look like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist3 = (?msi)EventCode=(4688).*^.*New Process Name:\s+.*(splunk-winprintmon\.exe)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This would omit the first carat, as well as the "trailing" .* .  I also put the backslash between splunk-winprintmon and the .exe .&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 20:15:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220901#M64898</guid>
      <dc:creator>baf879</dc:creator>
      <dc:date>2016-01-07T20:15:24Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220902#M64899</link>
      <description>&lt;P&gt;To investigate the latency, you might turn on the Distributed Management Console on your indexer (if you haven't already) and look at the indexing dashboards, particular the queues...&lt;/P&gt;

&lt;P&gt;For more information, go to &lt;A href="http://conf.splunk.com/speakers.html#"&gt;http://conf.splunk.com/speakers.html#&lt;/A&gt; and search the page for the topic "How splunkd Works" &lt;BR /&gt;
It's a great presentation, if you haven't seen it before. There is both a recording and a slide download link.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 20:30:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220902#M64899</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2016-01-07T20:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220903#M64900</link>
      <description>&lt;P&gt;Yes, you're right.  Somehow the formatting got messed up.  The line should look like the one you've posted.&lt;/P&gt;

&lt;P&gt;blacklist3 = (?msi)EventCode=(4688).&lt;EM&gt;^.*New Process Name:\s+.&lt;/EM&gt;(splunk-winprintmon.exe)&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:19:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220903#M64900</guid>
      <dc:creator>jchampagne_splu</dc:creator>
      <dc:date>2020-09-29T08:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220904#M64901</link>
      <description>&lt;P&gt;No luck this time.  I did comment out the entries you said probably aren't working, and bumped this up to #1.  So my inputs.conf contains this line:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist1 = (?msi)EventCode=(4688).*^.*New Process Name:\s+.*(splunk-winprintmon.exe)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 07 Jan 2016 21:02:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220904#M64901</guid>
      <dc:creator>baf879</dc:creator>
      <dc:date>2016-01-07T21:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220905#M64902</link>
      <description>&lt;P&gt;Are you sure that the Universal Forwarder can do this? Unless something has changed, it was my understanding that they do not do the same detailed input parsing as a Heavy Indexer, therefore you wouldn't be able to do a blacklist regex which matches a pattern INSIDE the file. Even the examples in the Docs on Splunk's own site note only matching the filename/path with a regex.&lt;/P&gt;

&lt;P&gt;EDIT - Okay, I see (looking at the inputs.conf spec) that this appears to be a specific special case (being able to filter event level data at the UF level) for the [WinEventLog://] input type. Regular [monitor://] types and others still have no ability to blacklist at the event level by regex, correct?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 22:33:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220905#M64902</guid>
      <dc:creator>tmeader</dc:creator>
      <dc:date>2016-01-07T22:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220906#M64903</link>
      <description>&lt;P&gt;Unless there is a very high volume of data to be discarded, I take a different approach. I prefer discarding the data on the indexer, because I (Splunk Admin) &lt;EM&gt;own&lt;/EM&gt; the indexer. It is possible, though unlikely, that someone could muck with the settings on the forwarder, which is on a server that I do not own.&lt;/P&gt;

&lt;P&gt;Unless you are discarding at least 50% of the data, there is rarely any performance benefit to discarding the data on the UF.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2016 01:21:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220906#M64903</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2016-01-08T01:21:41Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220907#M64904</link>
      <description>&lt;P&gt;Okay, I broke down and read all the documentation I could find on filtering Windows inputs. I believe that your syntax is wrong. I am not sure that there is a way to do what you want on the UF.&lt;/P&gt;

&lt;P&gt;First, this type of filtering &lt;EM&gt;only works&lt;/EM&gt; on Windows event logs, eg&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Second, you need to specify the regular expression against specific fields, which they call "keys", for example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; blacklist = EventCode=%4688$% User=%lguinn%
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I don't see a key for " New Process Name"&lt;BR /&gt;
Here is an excerpt from &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf"&gt;inputs.conf.spec&lt;/A&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Valid keys for the regex format:
 * The following keys are equivalent to the fields which appear in the text of
  the acquired events: Category CategoryString ComputerName EventCode
  EventType Keywords LogName Message OpCode RecordNumber Sid SidType
  SourceName TaskCategory Type User
 * There are two special keys that do not appear literally in the event.
 * $TimeGenerated : The time that the computer generated the event
 * $Timestamp: The time that the event was received and recorded by the
                Event Log service.
 * EventType is only available on Server 2003 / XP and earlier
 * Type is only available on Server 2008 / Vista and later
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Also, I read &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.3.2/Data/MonitorWindowseventlogdata"&gt;Monitor Windows event log data&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;So, unless someone can show that this &lt;EM&gt;ever worked&lt;/EM&gt; in some other way - may I suggest that you do the filtering on the indexer?&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2016 01:39:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220907#M64904</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2016-01-08T01:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220908#M64905</link>
      <description>&lt;P&gt;Lisa is totally right, I had forgotten that there are specific keys that we extract for filtering Windows events at the forwarder level.  We've got to create RegEx filters for each of those keys.&lt;/P&gt;

&lt;P&gt;This should work:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist1 = EventCode="4688" Message="New Process Name:\s+.*(splunk-winprintmon\.exe)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;With this blacklist1 rule, we've got two keys, EventCode and Message. Each of those keys have a RegEx value that is bounded by comma delimiters as required in the spec.&lt;/P&gt;

&lt;P&gt;I don't believe that matching for the Message key is anchored, however, if it is, we'll probably need to do something like this to match all of the message text prior to "New Process Name":&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist1 = EventCode="4688" Message="(?s).*New Process Name:\s+.*(splunk-winprintmon\.exe)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;However, I'd try the initial RegEx first.&lt;/P&gt;

&lt;P&gt;Big thanks to Lisa for pointing out that we've got to work with Keys and not just the raw data!&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2016 14:46:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220908#M64905</guid>
      <dc:creator>jchampagne_splu</dc:creator>
      <dc:date>2016-01-08T14:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220909#M64906</link>
      <description>&lt;P&gt;See my comments below under Lisa's answer.  I made a mistake above and we actually need to work with a specific set of Keys here, not just the raw event.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2016 14:48:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220909#M64906</guid>
      <dc:creator>jchampagne_splu</dc:creator>
      <dc:date>2016-01-08T14:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220910#M64907</link>
      <description>&lt;P&gt;Also, the values above for blacklist1 and blacklist2 should match&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2016 14:52:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220910#M64907</guid>
      <dc:creator>jchampagne_splu</dc:creator>
      <dc:date>2016-01-08T14:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder blacklist - Can anyone help with a simple regex?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220911#M64908</link>
      <description>&lt;P&gt;All:&lt;/P&gt;

&lt;P&gt;Thanks again for all of the research and suggestions.  I was able to get this resolved late yesterday - I posted my solution to this page but for whatever reason it isn't showing up so I'll try it again.  Through a combination of reading (and re-reading, and staring, and re-reading) the inputs.conf.spec and flat out trying everything, this was the working solution:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist1 = EventCode="4688" Message="(A new process has been created)(?s).*(splunk-winprintmon)"
blacklist2 = EventCode="4688" Message="(A new process has been created)(?s).*(splunk-regmon)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;My next step is to consolidate these two lines into one, and include the other Splunk UF events I don't currently need (splunk-netmon, splunk-admon).  The UF is limited to 10 blacklist items, so I'm thinking there is a way via regex to look for "splunk-*mon.exe".  If anyone has a quick fix for that, I'd be glad to hear it.&lt;/P&gt;

&lt;P&gt;I appreciate everyone's suggestions and ideas, it was a big help in getting this implemented!&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2016 14:59:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Universal-Forwarder-blacklist-Can-anyone-help-with-a-simple/m-p/220911#M64908</guid>
      <dc:creator>baf879</dc:creator>
      <dc:date>2016-01-08T14:59:20Z</dc:date>
    </item>
  </channel>
</rss>

