<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Wineventlog Filtration in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Wineventlog-Filtration/m-p/548720#M5636</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Based on this query I want to filter out wineventlog before ingesting into Splunk. So that i can save some licenses. So the condition is something like for two of the sourcetypes and for the particular eventcodes (4624,4634) I want to filter out if the logs comes from Account Name= - &amp;amp; *$ for the particular set of hosts.&lt;/P&gt;&lt;P&gt;index=abc sourcetype IN (winev,wind) EventCode IN (4624,4634) Account_Name="-" Account_Name="*$" host=*xyz*&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So do we need to write the blacklist stanza in the inputs.conf file or do we need to specify the props and transforms separately.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually for all Windows client machines we are ingesting the wineventlog with the help of Deployment master server.&lt;/P&gt;&lt;P&gt;So from Deployment master server we used to push the configurations to all windows machines so kindly help with the stanza for the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 21 Apr 2021 05:42:03 GMT</pubDate>
    <dc:creator>anandhalagaras1</dc:creator>
    <dc:date>2021-04-21T05:42:03Z</dc:date>
    <item>
      <title>Wineventlog Filtration</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Wineventlog-Filtration/m-p/548720#M5636</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Based on this query I want to filter out wineventlog before ingesting into Splunk. So that i can save some licenses. So the condition is something like for two of the sourcetypes and for the particular eventcodes (4624,4634) I want to filter out if the logs comes from Account Name= - &amp;amp; *$ for the particular set of hosts.&lt;/P&gt;&lt;P&gt;index=abc sourcetype IN (winev,wind) EventCode IN (4624,4634) Account_Name="-" Account_Name="*$" host=*xyz*&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So do we need to write the blacklist stanza in the inputs.conf file or do we need to specify the props and transforms separately.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually for all Windows client machines we are ingesting the wineventlog with the help of Deployment master server.&lt;/P&gt;&lt;P&gt;So from Deployment master server we used to push the configurations to all windows machines so kindly help with the stanza for the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Apr 2021 05:42:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Wineventlog-Filtration/m-p/548720#M5636</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-04-21T05:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: Wineventlog Filtration</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Wineventlog-Filtration/m-p/548724#M5637</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You can use blacklist on your inputs like below, but this will not filter on host base. You may think about sending this stanza to specific hosts by creating a separate serverclass.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog:Security]
blacklist1 = EventCode = "4624" Message = "Account Name:\s+-"
blacklist2 = EventCode = "4624" Message = "Account Name:\s+*\$"&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 21 Apr 2021 06:08:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Wineventlog-Filtration/m-p/548724#M5637</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2021-04-21T06:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: Wineventlog Filtration</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Wineventlog-Filtration/m-p/548736#M5639</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your response. So i have created an app and enter the blacklist as mentioned below and planning to deploy for those particular hosts as you have explained.&lt;/P&gt;&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;disabled=0&lt;BR /&gt;current_only=1&lt;BR /&gt;blacklist1 = EventCode = "4624" Message = "Account Name:\s+-"&lt;BR /&gt;blacklist2 = EventCode = "4624" Message = "Account Name:\s+*\$"&lt;BR /&gt;blacklist3 = EventCode = "4634" Message = "Account Name:\s+-"&lt;BR /&gt;blacklist4 = EventCode = "4634" Message = "Account Name:\s+*\$"&lt;BR /&gt;renderXml=0&lt;BR /&gt;index = abc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But already I can see there is one inputs.conf file for&amp;nbsp;[WinEventLog://Security] and there are around 10 blacklist mentioned for those&amp;nbsp;[WinEventLog://Security] and these 10 blacklist is getting deployed to all the Windows client machines since in serverclass.conf file and i can see that they have whitelist as * for the hosts. So its deployed to all windows client machines.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So&amp;nbsp; as mentioned above, If i deploy the Recently created app for the set of servers &amp;amp; for the eventcode (4624, 4634) will it affect the existing blacklist which is already present (i.e. 10 blacklist) since both of the source are same&amp;nbsp;[WinEventLog://Security].&lt;/P&gt;&lt;P&gt;Kindly help to confirm the same. So based on that i will plan and deploy it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Apr 2021 07:57:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Wineventlog-Filtration/m-p/548736#M5639</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-04-21T07:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: Wineventlog Filtration</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Wineventlog-Filtration/m-p/548751#M5640</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Now I have created an app and deployed for those servers alone by mentioning in the serverclass.conf file but still I can see the logs are still getting ingested into Splunk.&lt;/P&gt;&lt;P&gt;So is there anything which I am missing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;disabled=0&lt;BR /&gt;current_only=1&lt;BR /&gt;blacklist1 = EventCode = "4624" Message = "Account Name:\s+-"&lt;BR /&gt;blacklist2 = EventCode = "4624" Message = "Account Name:\s+*\$"&lt;BR /&gt;blacklist3 = EventCode = "4634" Message = "Account Name:\s+-"&lt;BR /&gt;blacklist4 = EventCode = "4634" Message = "Account Name:\s+*\$"&lt;BR /&gt;renderXml=0&lt;BR /&gt;index = abc&lt;/P&gt;&lt;P&gt;I have also restarted the splunk services in all those client machines. But still I can see the logs are ingesting into Splunk.&lt;/P&gt;&lt;P&gt;So is it because of another inputs which is already present for the same source so is it not working? Kindly help me on the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Apr 2021 09:10:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Wineventlog-Filtration/m-p/548751#M5640</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-04-21T09:10:21Z</dc:date>
    </item>
    <item>
      <title>Re: Wineventlog Filtration</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Wineventlog-Filtration/m-p/548873#M5644</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you kindly check and help me out on the same.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 02:14:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Wineventlog-Filtration/m-p/548873#M5644</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-04-22T02:14:31Z</dc:date>
    </item>
  </channel>
</rss>

