Splunk Search

Whitelist regex in Windows Universal Forwarder don't work

borshoff
Explorer

Hello.

I need to monitor events with EventCode="4656 on windows server. But only events with string "ObjectType: File" in Message.

inputs.conf

Blacklist1 = EventCode="4656" Message="ObjectType:\s+(!?File)"

But with my conf it doesn't work.
Where is mistake?

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

There's no need for a capturing group. Also, (!? is not a valid regex construct. Perhaps you meant (?!, but there's no need for negation.
Have you tried whitelist1 = EventCode="4656" Message="ObjectType:\s+File" ?

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

There's no need for a capturing group. Also, (!? is not a valid regex construct. Perhaps you meant (?!, but there's no need for negation.
Have you tried whitelist1 = EventCode="4656" Message="ObjectType:\s+File" ?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...

UCC Framework: Discover Developer Toolkit for Building Technology Add-ons

The Next-Gen Toolkit for Splunk Technology Add-on Development The Universal Configuration Console (UCC) ...

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...