<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: getting bombarded with windows security error code 5156 and 5157 (Win security) in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/getting-bombarded-with-windows-security-error-code-5156-and-5157/m-p/332304#M19530</link>
    <description>&lt;P&gt;As always your help and suggestions are most appreciated. I will spin up a splunk server and a couple of clients and test this out. I myself have a couple of concepts that i need testing as well.&lt;BR /&gt;
Thanks&lt;BR /&gt;
/R&lt;/P&gt;</description>
    <pubDate>Wed, 11 Apr 2018 19:02:11 GMT</pubDate>
    <dc:creator>ranjitbrhm1</dc:creator>
    <dc:date>2018-04-11T19:02:11Z</dc:date>
    <item>
      <title>getting bombarded with windows security error code 5156 and 5157 (Win security)</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/getting-bombarded-with-windows-security-error-code-5156-and-5157/m-p/332300#M19526</link>
      <description>&lt;P&gt;Hello All,&lt;BR /&gt;
   I have a distributed system where i have a heavy forwarder collecting traffic from the UF's and forwarding events to the indexer. I have a DMC which is on another server. Currently im getting bombarded with 5156 and 5157 error messages from windows security. Ive read somwhere that i can blacklist the values on inputs.conf. Can someone please let me know on which inputs.conf file on which server i have to do the blacklist on? Alternatively is there any other method to control this constant flow of data?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Apr 2018 16:37:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/getting-bombarded-with-windows-security-error-code-5156-and-5157/m-p/332300#M19526</guid>
      <dc:creator>ranjitbrhm1</dc:creator>
      <dc:date>2018-04-11T16:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: getting bombarded with windows security error code 5156 and 5157 (Win security)</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/getting-bombarded-with-windows-security-error-code-5156-and-5157/m-p/332301#M19527</link>
      <description>&lt;P&gt;@ranjitbrhm1, add the following blacklist to your inputs.conf stanza to filter out events from UF: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist = 5156,5157
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Refer to documentation: &lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWindowseventlogdata#Use_the_Security_event_log_to_monitor_changes_to_files"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWindowseventlogdata#Use_the_Security_event_log_to_monitor_changes_to_files&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Apr 2018 16:58:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/getting-bombarded-with-windows-security-error-code-5156-and-5157/m-p/332301#M19527</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2018-04-11T16:58:26Z</dc:date>
    </item>
    <item>
      <title>Re: getting bombarded with windows security error code 5156 and 5157 (Win security)</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/getting-bombarded-with-windows-security-error-code-5156-and-5157/m-p/332302#M19528</link>
      <description>&lt;P&gt;Thanks for the answer @niketnilay as always. I really appreciate it. But my main problem is on which %SPLUNK_HOME%\etc\system\local\inputs.conf do i make the changes to ? the app that i use to deploy the inputs.conf to the UF's. The heavy forwarders inputs or the indexers input. Thats the question that is boggling me. I tried sending out this change via the DMC on to the UF's but it does not have any effect it seems.&lt;/P&gt;

&lt;P&gt;My inputs.conf file is as below&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Application]
checkpointInterval = 5
current_only = 0
disabled = 0
start_from = oldest
index = winevents

[WinEventLog://Security]
checkpointInterval = 5
current_only = 0
disabled = 1
start_from = oldest
index = winevents
blacklist = 5156|5157|5158

[WinEventLog://System]
checkpointInterval = 5
current_only = 0
disabled = 0
start_from = oldest
index = winevents

[WinEventLog://ForwardedEvents]
checkpointInterval = 5
current_only = 0
disabled = 0
start_from = oldest
index = winevents

[perfmon://Windows__Processor]
counters = *
instances = _Total
interval = 10
object = Processor
index = winevents

[perfmon://Windows__Memory]
counters = Available Bytes
interval = 10
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 11 Apr 2018 17:58:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/getting-bombarded-with-windows-security-error-code-5156-and-5157/m-p/332302#M19528</guid>
      <dc:creator>ranjitbrhm1</dc:creator>
      <dc:date>2018-04-11T17:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: getting bombarded with windows security error code 5156 and 5157 (Win security)</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/getting-bombarded-with-windows-security-error-code-5156-and-5157/m-p/332303#M19529</link>
      <description>&lt;P&gt;@ranjitbrhm1, the heavy forwarder should definitely be able to filter, but UF should be able to filter events upfront. If possible test with a standalone machine and Test Splunk server.&lt;/P&gt;

&lt;P&gt;You can look into sending &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues"&gt;unwanted data to nullQueue&lt;/A&gt; before indexing, however, I strongly feel this should work. Let me convert my answer to comment for community Splunk experts to weigh in their opinion.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Apr 2018 18:57:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/getting-bombarded-with-windows-security-error-code-5156-and-5157/m-p/332303#M19529</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2018-04-11T18:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: getting bombarded with windows security error code 5156 and 5157 (Win security)</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/getting-bombarded-with-windows-security-error-code-5156-and-5157/m-p/332304#M19530</link>
      <description>&lt;P&gt;As always your help and suggestions are most appreciated. I will spin up a splunk server and a couple of clients and test this out. I myself have a couple of concepts that i need testing as well.&lt;BR /&gt;
Thanks&lt;BR /&gt;
/R&lt;/P&gt;</description>
      <pubDate>Wed, 11 Apr 2018 19:02:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/getting-bombarded-with-windows-security-error-code-5156-and-5157/m-p/332304#M19530</guid>
      <dc:creator>ranjitbrhm1</dc:creator>
      <dc:date>2018-04-11T19:02:11Z</dc:date>
    </item>
  </channel>
</rss>

