Getting Data In

Monitor Whitelist File extensions

SplunkUser5888
Path Finder

Hey guys, I guess this is a simple question but all the answers I look at seem very complicated for what I want.
I want splunk to do a monitor on C:\Program Files on extensions *.exe, *.com, *.scr and *.dll

But when I try

[monitor://C:\Program Files]
sourcetype = fileExtensions
whitelist = *.exe, *.dll, *.scr, *.com

I get ALL the files in Program Files appearing in the Splunk search.

I guess I am doing whitelisting wrong, any help?

Tags (1)
0 Karma
1 Solution

Mathieu_Dessus
Splunk Employee
Splunk Employee

Hi M-A 🙂

whitelist and blacklist are not a list of values, but a regular expression.
Have a look at the bottom of this page: http://docs.splunk.com/Documentation/Splunk/5.0/data/Specifyinputpathswithwildcards

View solution in original post

0 Karma

Mathieu_Dessus
Splunk Employee
Splunk Employee

Hi M-A 🙂

whitelist and blacklist are not a list of values, but a regular expression.
Have a look at the bottom of this page: http://docs.splunk.com/Documentation/Splunk/5.0/data/Specifyinputpathswithwildcards

0 Karma

SplunkUser5888
Path Finder

Salut, thanks, I couldn't find that document

0 Karma
Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...