<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filtering Windows event logs in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60540#M12019</link>
    <description>&lt;P&gt;BTW, WinEventLog:* did not work. Splunk expects the Security/Application/System facility keywords there.&lt;/P&gt;</description>
    <pubDate>Sat, 20 Aug 2011 22:42:56 GMT</pubDate>
    <dc:creator>splunker30039</dc:creator>
    <dc:date>2011-08-20T22:42:56Z</dc:date>
    <item>
      <title>Filtering Windows event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60534#M12013</link>
      <description>&lt;P&gt;I am not able to only forward certain interesting Windows events and ignore the rest. Running 4.2.x on both forwarder and indexer/receiver.&lt;/P&gt;

&lt;P&gt;It ignores my restrictions and sends all Windows logs, as if props/transforms in local\ does not get acknowledged..&lt;/P&gt;

&lt;P&gt;props:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::WinEventLog...]
TRANSFORMS-wmi = events-filter, events-null


[source::WinEventLog...]
TRANSFORMS-wmi = events-filter, events-null
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[events-null]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[events-filter]
REGEX=(?msi)^EventCode=(4625|4624|7036|1102|1033)
DEST_KEY = queue
FORMAT = indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Tried both &lt;CODE&gt;[source::WinEventLog...]&lt;/CODE&gt; and &lt;CODE&gt;[WMI:WinEventLog...]&lt;/CODE&gt;, doesnt make a difference.&lt;/P&gt;

&lt;P&gt;Driving me crazy, please assist.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Aug 2011 04:18:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60534#M12013</guid>
      <dc:creator>splunker30039</dc:creator>
      <dc:date>2011-08-19T04:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Windows event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60535#M12014</link>
      <description>&lt;P&gt;I don't think you want to use the ... wildcard for Windows events logs sources.  I'm not a Windows expert, but I suggest that you try&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::WinEventLog*]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Have you tried selecting by sourcetype instead of source?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Aug 2011 05:12:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60535#M12014</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2011-08-19T05:12:45Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Windows event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60536#M12015</link>
      <description>&lt;P&gt;Have to admit that I am slightly confused about the WMI VS source VS sourcetype, especially the Windows/Splunk changes since 4.2 etc. Is anyone else forwarding Windows logs and filtering on 4.2.x Splunk?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Aug 2011 14:58:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60536#M12015</guid>
      <dc:creator>splunker30039</dc:creator>
      <dc:date>2011-08-19T14:58:05Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Windows event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60537#M12016</link>
      <description>&lt;P&gt;In your props.conf, use &lt;CODE&gt;[WinEventLog:Security]&lt;/CODE&gt;, skipping the source:: part, as you actually want to use a sourcetype definition. You should be able to use &lt;CODE&gt;[WinEventLog:*]&lt;/CODE&gt; to apply this to all windows event logs, but I haven't tried doing this before, so I am 100% not sure.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Aug 2011 03:03:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60537#M12016</guid>
      <dc:creator>ftk</dc:creator>
      <dc:date>2011-08-20T03:03:34Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Windows event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60538#M12017</link>
      <description>&lt;P&gt;Working now.&lt;BR /&gt;
&lt;PRE&gt;&lt;BR /&gt;
props.conf:&lt;/PRE&gt;&lt;/P&gt;

&lt;P&gt;[WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-security= events-null, events-null3, events-filter&lt;/P&gt;

&lt;P&gt;[WinEventLog:System]&lt;BR /&gt;
TRANSFORMS-system= events-null, events-filter&lt;/P&gt;

&lt;P&gt;[WinEventLog:Application]&lt;BR /&gt;
TRANSFORMS-application= events-null, events-filter&lt;/P&gt;

&lt;P&gt;transforms.conf:&lt;BR /&gt;
[events-null]&lt;BR /&gt;
REGEX = .&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;[events-null3]&lt;BR /&gt;
REGEX=Logon Type=\s*(3)\D&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;[events-filter]&lt;BR /&gt;
REGEX=(?msi)^EventCode=(5157|4625|4624|7036|1102|1033)\D&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = indexQueue&lt;BR /&gt;
&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Key issues:&lt;/STRONG&gt;&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;make sure null filter is before any other event filters
&lt;/LI&gt;&lt;LI&gt;make sure it is on splunk 4.2+. If you have other apps installed, their config files may conflict
&lt;/LI&gt;&lt;LI&gt;Windows splunk seems to be pretty shaky, lots of bugs, bugfixes. I am on 4.2.2, working fine.
&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Sat, 20 Aug 2011 22:33:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60538#M12017</guid>
      <dc:creator>splunker30039</dc:creator>
      <dc:date>2011-08-20T22:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Windows event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60539#M12018</link>
      <description>&lt;P&gt;BTW, the logon type 3 null filter filters out automated logins, something that clogs up logs and I did not care about. The event IDs are for successful logins/failed logins, application installs and service restarts. I am using one filter for all three facilities, working fine.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Aug 2011 22:40:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60539#M12018</guid>
      <dc:creator>splunker30039</dc:creator>
      <dc:date>2011-08-20T22:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Windows event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60540#M12019</link>
      <description>&lt;P&gt;BTW, WinEventLog:* did not work. Splunk expects the Security/Application/System facility keywords there.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Aug 2011 22:42:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60540#M12019</guid>
      <dc:creator>splunker30039</dc:creator>
      <dc:date>2011-08-20T22:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Windows event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60541#M12020</link>
      <description>&lt;P&gt;I'm having a similar issue. How does splunk classify these logs as WinEvenLog? My previous, working, installation had &lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;P&gt;[default]&lt;/P&gt;

&lt;P&gt;TRANSFORMS-wmi=wminull&lt;/P&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;P&gt;[wminull]&lt;/P&gt;

&lt;P&gt;REGEX=(?msi)^EventCode=(4768|4776|4769|4932|4933|5152|5158|4634|4672|5156|4662|4624|7036|5145|5140)\D&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2012 23:49:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60541#M12020</guid>
      <dc:creator>mayler</dc:creator>
      <dc:date>2012-04-24T23:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Windows event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60542#M12021</link>
      <description>&lt;P&gt;I'm having a similar issue. How does splunk classify these logs as WinEvenLog? My previous, working, installation had&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;P&gt;[default]&lt;/P&gt;

&lt;P&gt;TRANSFORMS-wmi=wminull&lt;/P&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;P&gt;[wminull]&lt;/P&gt;

&lt;P&gt;REGEX=(?msi)^EventCode=(4768|4776|4769|4932|4933|5152|5158|4634|4672|5156|4662|4624|7036|5145|5140)D DEST_KEY=queue FORMAT=nullQueue&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2012 23:50:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60542#M12021</guid>
      <dc:creator>mayler</dc:creator>
      <dc:date>2012-04-24T23:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Windows event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60543#M12022</link>
      <description>&lt;P&gt;It worked perfect when I set those values on HeavyForwarder configurations.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2013 17:07:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60543#M12022</guid>
      <dc:creator>fabiocaldas</dc:creator>
      <dc:date>2013-08-16T17:07:27Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Windows event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60544#M12023</link>
      <description>&lt;P&gt;On the latest Splunk versions 6.0+ you will want to have the Splunk_TA_Windows installed on the Forwarder and Indexer/Search Head tiers. This TA will extract the Event Code fields for you from Windows Event Logs. &lt;/P&gt;

&lt;P&gt;Don't forget to also turn on auditing and domain policies for the specific events you want to collect.&lt;/P&gt;

&lt;P&gt;Check out the Splunk Blog post about Windows Event Filtering &lt;BR /&gt;
&lt;A href="http://blogs.splunk.com/2013/10/14/windows-event-logs-in-splunk-6/" target="_blank"&gt;http://blogs.splunk.com/2013/10/14/windows-event-logs-in-splunk-6/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 17:43:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filtering-Windows-event-logs/m-p/60544#M12023</guid>
      <dc:creator>mcronkrite</dc:creator>
      <dc:date>2020-09-28T17:43:36Z</dc:date>
    </item>
  </channel>
</rss>

