Getting Data In

How do I blacklist events with a field containing a specific value?

Loves-to-Learn Everything

I have a set of JSON data and I would like to ignore (blacklist) all events where the field "id.orig_h" contains the value "".

So far, I've tried using the blacklisting procedure for Windows EventCodes as a model, but with no success. Example EventCode blacklist:

blacklist1 = EventCode = "4662" Message = "Account Name:\s+(example account)"

What I've tried:

1) Adding the blacklist underneath the monitor stanza in inputs.conf

index = yada
sourcetype = yadayada
blacklist = id.orig_h = ""

2) Adding the blacklist under a separate sourcetype stanza in inputs.conf

index = yada
sourcetype = yadayada

blacklist = id.orig_h = ""

How can I achieve this?

0 Karma


The technique for blacklisting Windows event log data only works for Windows event log data. To ignore other events, use props and transforms to send selected events to the NULL queue. See and .

If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...