<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: windows Event filtering in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67470#M70566</link>
    <description>&lt;P&gt;Thanks for that and appreciated it&lt;/P&gt;

&lt;P&gt;Let me confirm few things and please correct me if i am doing something wrong&lt;/P&gt;

&lt;P&gt;1) Create two files (props.conf and transforms.conf)on index server(not on forwarder).&lt;BR /&gt;
2) Two files doesn't have any other contains apart from above lines(of course with appropriate names).&lt;/P&gt;

&lt;P&gt;How do we differentiate source type to be WMI or windowsEventlog?&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Fri, 20 Sep 2013 01:15:51 GMT</pubDate>
    <dc:creator>AKG</dc:creator>
    <dc:date>2013-09-20T01:15:51Z</dc:date>
    <item>
      <title>windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67461#M70557</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;

&lt;P&gt;We are trying to discard some noisy events from a windows server with specific event ID and wanted to do this from index server(not from forwarder).&lt;/P&gt;

&lt;P&gt;we are not sure if we can use the conditional statement on transforms.conf file? I have following sample file and will appreciate if you could help us&lt;/P&gt;

&lt;P&gt;I have copied relevant stanza from /default to /local and created two files as below &lt;/P&gt;

&lt;P&gt;/local/props.conf&lt;BR /&gt;
[wmi]&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
LINE_BREAKER = ([\r\n]+---splunk-wmi-end-of-event---\r\n[\r\n]*)&lt;BR /&gt;
CHARSET = UTF-8&lt;BR /&gt;
TRANSFORMS-wmi=wminull&lt;/P&gt;

&lt;P&gt;/local/transforms.conf&lt;BR /&gt;
[wminull]&lt;BR /&gt;
REGEX = (?m)ComputerName=(hostname)&lt;BR /&gt;
DEST_KEY = MetaData:Host&lt;BR /&gt;
FORMAT = host::$1&lt;/P&gt;

&lt;P&gt;---where do i put event ID?-------- &lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:48:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67461#M70557</guid>
      <dc:creator>AKG</dc:creator>
      <dc:date>2020-09-28T14:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67462#M70558</link>
      <description>&lt;P&gt;This is very easy to do.  But, we need more information.&lt;BR /&gt;
Which events would you like to drop?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2013 02:20:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67462#M70558</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-09-19T02:20:27Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67463#M70559</link>
      <description>&lt;P&gt;Hi Luke Thanks for the reply&lt;/P&gt;

&lt;P&gt;event ID:- 4776&lt;BR /&gt;
logon account:- dms-user&lt;BR /&gt;
Server Name :- dms-server&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2013 02:24:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67463#M70559</guid>
      <dc:creator>AKG</dc:creator>
      <dc:date>2013-09-19T02:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67464#M70560</link>
      <description>&lt;P&gt;How funny is that, not one field but 3.  It's still easy, but it will take a little time.  Unfortunately, it is bed time for me.&lt;BR /&gt;
What you're looking to do is to drop a particular event, and the solution will be based on the answer to this post:&lt;BR /&gt;
&lt;A href="http://answers.splunk.com/answers/99905/how-to-forward-only-specific-windows-eventlogs-via-splunk-universal-forwarder"&gt;http://answers.splunk.com/answers/99905/how-to-forward-only-specific-windows-eventlogs-via-splunk-universal-forwarder&lt;/A&gt;&lt;BR /&gt;
As you can see, the regex will need to be modified to include the multiple field values you've specified.&lt;BR /&gt;
If it is not already done by the time I wake up, I'll give you a solution in the morning.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2013 02:44:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67464#M70560</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-09-19T02:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67465#M70561</link>
      <description>&lt;P&gt;Ya we are also trying to make sure all those three conditions are true(AND condition rather Than Or) before we drop the event.&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2013 03:34:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67465#M70561</guid>
      <dc:creator>AKG</dc:creator>
      <dc:date>2013-09-19T03:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67466#M70562</link>
      <description>&lt;P&gt;This should work for you:&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;     [source::wineventlog:security]
     TRANSFORMS-drop = delFilter
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    [delFilter]
    REGEX = (?msi)^EventCode=4776\D.*^Logon\s+Account:\s+dms-user.*^Source\s+Workstation:\s+dms-server
    DEST_KEY = queue
    FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You will notice that I changed your Server Name to Source Workstation because the EventCode 4776 does not have a Server Name field.  If you meant Computer Name, then that would need to get inserted between Event Code and Logon Account.  Like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[delFilter]
        REGEX = (?msi)^EventCode=4776\D.*^ComputerName=dms-server.*^Logon\s+Account:\s+dms-user
        DEST_KEY = queue
        FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Good questions.&lt;/P&gt;

&lt;P&gt;1)  Yes, they need to be created on the indexer unless there is a heavy forwarder in between the source and indexer – in which case they might need to go on the forwarder depending on whether or not the heavy forwarder is ‘cooking’ data.&lt;/P&gt;

&lt;P&gt;2)  For props.conf and transforms.conf, you may have other entries, but be careful that they don’t conflict with the entries for this filter. &lt;/P&gt;

&lt;P&gt;3)  WMI inputs and monitoring Windows Eventlogs are two different animals.&lt;/P&gt;

&lt;P&gt;a.  The_wolverine says that the source needs to be specified as wmi for wmi data, but can be the standard wineventlog:security for monitoring of event logs.  But, that was an old post, so perhaps things have changed.  You can read the post for yourself &lt;BR /&gt;
here:&lt;BR /&gt;&lt;BR /&gt;
&lt;A href="http://answers.splunk.com/answers/3239/try-to-route-certain-wmi-events-to-nullqueue"&gt;http://answers.splunk.com/answers/3239/try-to-route-certain-wmi-events-to-nullqueue&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;b.  What this means is that for the props.conf [source::wineventlog:security] you might need to change it to [wmi].  &lt;/P&gt;

&lt;P&gt;I can’t test this until tomorrow.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2013 13:05:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67466#M70562</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-09-19T13:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67467#M70563</link>
      <description>&lt;P&gt;Hi Luke&lt;/P&gt;

&lt;P&gt;Thanks for the answer and you are right I meant Computer-Name not server name.&lt;/P&gt;

&lt;P&gt;I didn't quite understand why s+Workstation:\s+dms-server needed if we just want to validate against three conditions(as above).&lt;/P&gt;

&lt;P&gt;so which one would be right one?&lt;/P&gt;

&lt;P&gt;REGEX = (?msi)^EventCode=4776\ComputerName=dms-server\D.&lt;EM&gt;^Logon\s+Account:\s+dms-user.&lt;/EM&gt;^Source\s+Workstation:\s+dms-server&lt;/P&gt;

&lt;P&gt;or &lt;/P&gt;

&lt;P&gt;REGEX = (?msi)^EventCode=4776\ComputerName=dms-server\D.&lt;EM&gt;^Logon\s+Account:\s+dms-user.&lt;/EM&gt;^Source&lt;/P&gt;

&lt;P&gt;Thank you again.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2013 23:39:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67467#M70563</guid>
      <dc:creator>AKG</dc:creator>
      <dc:date>2013-09-19T23:39:07Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67468#M70564</link>
      <description>&lt;P&gt;As you can see, putting code in comments is hard because the system strips out special characters.  I'll update the answer to use ComputerName shortly.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2013 23:50:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67468#M70564</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-09-19T23:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67469#M70565</link>
      <description>&lt;P&gt;You don't need Source Workstation if you need ComputerName instead.  I updated the answer with the code.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2013 00:14:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67469#M70565</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-09-20T00:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67470#M70566</link>
      <description>&lt;P&gt;Thanks for that and appreciated it&lt;/P&gt;

&lt;P&gt;Let me confirm few things and please correct me if i am doing something wrong&lt;/P&gt;

&lt;P&gt;1) Create two files (props.conf and transforms.conf)on index server(not on forwarder).&lt;BR /&gt;
2) Two files doesn't have any other contains apart from above lines(of course with appropriate names).&lt;/P&gt;

&lt;P&gt;How do we differentiate source type to be WMI or windowsEventlog?&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2013 01:15:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67470#M70566</guid>
      <dc:creator>AKG</dc:creator>
      <dc:date>2013-09-20T01:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67471#M70567</link>
      <description>&lt;P&gt;Thanks Luke&lt;/P&gt;

&lt;P&gt;All done its working now. I had to change the source in props.conf as below and it worked as charm.&lt;/P&gt;

&lt;P&gt;[source::WinEventLog:ForwardedEvents]&lt;/P&gt;

&lt;P&gt;Also if I want to filter another server with similar category can i just insert another REGEX line in transforms.conf file?&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2013 01:45:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67471#M70567</guid>
      <dc:creator>AKG</dc:creator>
      <dc:date>2013-09-20T01:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67472#M70568</link>
      <description>&lt;P&gt;To insert another server in the ComputerName field, then you need to use the OR operator (otherwise|known as pipe).&lt;BR /&gt;
For example:&lt;BR /&gt;&lt;BR /&gt;
ComputerName=(dms-server1|dms-server2)&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2013 01:56:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67472#M70568</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-09-20T01:56:40Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67473#M70569</link>
      <description>&lt;P&gt;Thank you very much Luke very much appreciated and things are working as expected.&lt;/P&gt;

&lt;P&gt;Thank you gain.&lt;/P&gt;</description>
      <pubDate>Sun, 22 Sep 2013 23:45:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67473#M70569</guid>
      <dc:creator>AKG</dc:creator>
      <dc:date>2013-09-22T23:45:17Z</dc:date>
    </item>
    <item>
      <title>Re: windows Event filtering</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67474#M70570</link>
      <description>&lt;P&gt;Just to note, still works completely fine. Used this as a base to get rid of Logoff events.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2016 22:18:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/windows-Event-filtering/m-p/67474#M70570</guid>
      <dc:creator>LewisWheeler</dc:creator>
      <dc:date>2016-04-26T22:18:39Z</dc:date>
    </item>
  </channel>
</rss>

