Splunk Search

Whitelist regex in Windows Universal Forwarder don't work

borshoff
Explorer

Hello.

I need to monitor events with EventCode="4656 on windows server. But only events with string "ObjectType: File" in Message.

inputs.conf

Blacklist1 = EventCode="4656" Message="ObjectType:\s+(!?File)"

But with my conf it doesn't work.
Where is mistake?

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

There's no need for a capturing group. Also, (!? is not a valid regex construct. Perhaps you meant (?!, but there's no need for negation.
Have you tried whitelist1 = EventCode="4656" Message="ObjectType:\s+File" ?

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

There's no need for a capturing group. Also, (!? is not a valid regex construct. Perhaps you meant (?!, but there's no need for negation.
Have you tried whitelist1 = EventCode="4656" Message="ObjectType:\s+File" ?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Devesh Logendran, Splunk, and the Singapore Cyber Conquest

At this year’s Splunk University, I had the privilege of chatting with Devesh Logendran, one of the winners in ...

There's No Place Like Chrome and the Splunk Platform

WATCH NOW!Malware. Risky Extensions. Data Exfiltration. End-users are increasingly reliant on browsers to ...

Customer Experience | Join the Customer Advisory Board!

Are you ready to take your Splunk journey to the next level? 🚀 We invite you to join our elite squad ...