Splunk Search

Whitelist regex in Windows Universal Forwarder don't work

borshoff
Explorer

Hello.

I need to monitor events with EventCode="4656 on windows server. But only events with string "ObjectType: File" in Message.

inputs.conf

Blacklist1 = EventCode="4656" Message="ObjectType:\s+(!?File)"

But with my conf it doesn't work.
Where is mistake?

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

There's no need for a capturing group. Also, (!? is not a valid regex construct. Perhaps you meant (?!, but there's no need for negation.
Have you tried whitelist1 = EventCode="4656" Message="ObjectType:\s+File" ?

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

There's no need for a capturing group. Also, (!? is not a valid regex construct. Perhaps you meant (?!, but there's no need for negation.
Have you tried whitelist1 = EventCode="4656" Message="ObjectType:\s+File" ?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...