<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: input.conf whitelist for windows eventlogs in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197264#M39188</link>
    <description>&lt;P&gt;If you're using your Splunk server as a deployment server then you would edit the inputs.conf file in opt/splunk/etc/deploymentapps//local/inputs.conf and then once you made the change and restarted the server that configuration would automatically be pushed out.&lt;/P&gt;

&lt;P&gt;Yes you can configure whitelists and blacklists at the same time. Just remember that the blacklists take precedent.&lt;/P&gt;

&lt;P&gt;Splunk can handle up to 10 blacklists and whitelists. This is a good reference: &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.1/Data/MonitorWindowsdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.1/Data/MonitorWindowsdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 29 Dec 2014 18:39:33 GMT</pubDate>
    <dc:creator>kjhanson</dc:creator>
    <dc:date>2014-12-29T18:39:33Z</dc:date>
    <item>
      <title>input.conf whitelist for windows eventlogs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197260#M39184</link>
      <description>&lt;P&gt;We are trying to capture failed logons from our AD server but only want to capture specific event logs.&lt;/P&gt;

&lt;P&gt;We are using the Splunk Deployment so we don't have to configure each of the 20 servers as we install the Universal Forwarder.  I have done a lot of reading through the online docus and searching here but can't figure out how to whitelist only specific codes so we don't use up all of our license on data we don't want to see.  Here is a snippet of the input.conf that I am pushing out with the deployment server.  This is in the Program Files\Splunk\etc\deployment-apps\Splunk_TA_windows\local folder where it is pushed out. I just need a little assistance on what I am missing.&lt;/P&gt;

&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
start_from = oldest&lt;BR /&gt;
current_only = 0&lt;BR /&gt;
evt_resolve_ad_obj = 1&lt;BR /&gt;
checkpointInterval = 5&lt;BR /&gt;
whitelist = "EventCode = 4624,4625,4648,4649,4723,4724,4727,4728-4730,4737,4754,4755-4758,4720,4722-4726,4738,4740,4767,4771,4780,4781,5378"&lt;/P&gt;

&lt;P&gt;Help me stop pulling my hair out.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:50:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197260#M39184</guid>
      <dc:creator>cannarella</dc:creator>
      <dc:date>2020-09-28T16:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: input.conf whitelist for windows eventlogs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197261#M39185</link>
      <description>&lt;P&gt;You can use :&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;whitelist = 4624,4625,4648,4649,4723,4724,4727,4728-4730,4737,4754,4755-4758,4720,4722-4726,4738,4740,4767,4771,4780,4781,5378&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;and make sure that you restarted to apply, and that you are on version 6.0.* or 6.1.*&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jun 2014 16:53:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197261#M39185</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2014-06-12T16:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: input.conf whitelist for windows eventlogs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197262#M39186</link>
      <description>&lt;P&gt;and use inputs.conf not input.conf.&lt;BR /&gt;
to verify the result use the btool command.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;splunk cmd btool inputs list --debug&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jun 2014 16:58:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197262#M39186</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2014-06-12T16:58:32Z</dc:date>
    </item>
    <item>
      <title>Re: input.conf whitelist for windows eventlogs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197263#M39187</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Even we are planning for the same thing in our environment can u help me out on this .&lt;/P&gt;

&lt;P&gt;i have deployment app on my splunk server and 60 windows server so to make changes in all the server at one time i need to go in to the app folder and in that input.conf ?&lt;/P&gt;

&lt;P&gt;can i configure blacklist and whitlist same time?&lt;/P&gt;

&lt;P&gt;is there any limitation in creating whitelist and blacklist ? &lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2014 07:49:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197263#M39187</guid>
      <dc:creator>ITICSNORTH</dc:creator>
      <dc:date>2014-11-13T07:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: input.conf whitelist for windows eventlogs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197264#M39188</link>
      <description>&lt;P&gt;If you're using your Splunk server as a deployment server then you would edit the inputs.conf file in opt/splunk/etc/deploymentapps//local/inputs.conf and then once you made the change and restarted the server that configuration would automatically be pushed out.&lt;/P&gt;

&lt;P&gt;Yes you can configure whitelists and blacklists at the same time. Just remember that the blacklists take precedent.&lt;/P&gt;

&lt;P&gt;Splunk can handle up to 10 blacklists and whitelists. This is a good reference: &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.1/Data/MonitorWindowsdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.1/Data/MonitorWindowsdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Dec 2014 18:39:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197264#M39188</guid>
      <dc:creator>kjhanson</dc:creator>
      <dc:date>2014-12-29T18:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: input.conf whitelist for windows eventlogs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197265#M39189</link>
      <description>&lt;P&gt;This blog entry shows that on Splunk 6 you can just enter the EventCode numbers as shown here by @yannK -- &lt;A href="http://blogs.splunk.com/2013/10/14/windows-event-logs-in-splunk-6/"&gt;http://blogs.splunk.com/2013/10/14/windows-event-logs-in-splunk-6/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2015 23:31:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197265#M39189</guid>
      <dc:creator>wrangler2x</dc:creator>
      <dc:date>2015-09-29T23:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: input.conf whitelist for windows eventlogs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197266#M39190</link>
      <description>&lt;P&gt;@yannK&lt;/P&gt;

&lt;P&gt;I'm having trouble with this. I implemented it in a deployment app, and just assumed it was working. But today I restarted a forwarder which gave me this error:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;Invalid key in stanza [WinEventLog:Security] in C:\Program Files\Splunk\etc\apps\OIT_WINEVENT_DC_INDEX_WIN_01\default\inputs&lt;BR /&gt;
.conf, line 23: whitelist (value: 528-535,539-540,624-626,632,636,659,642-644,660,675-676,671-672,680-681,1100,1102,1104,1108,4612,4616,46&lt;BR /&gt;
18,4624-4625,4634,4720,4728,4732,4738,4740,4756,4767-4768,4771-4772,4776,5461 )&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Here is the stanza in question (from the deployment app inputs.conf):&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]
disabled = 0
index= winevent_dc_index
whitelist = 528-535,539-540,624-626,632,636,659,642-644,660,675-676,671-672,680-681,1100,1102,1104,1108,4612,4616,4618,4624-4625,4634,4720,4728,4732,4738,4740,4756,4767-4768,4771-4772,4776,5461
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The forwarder is running on 6.1.4 code. Should it not work there? Or do you see something wrong with this?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2015 23:31:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197266#M39190</guid>
      <dc:creator>wrangler2x</dc:creator>
      <dc:date>2015-12-11T23:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: input.conf whitelist for windows eventlogs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197267#M39191</link>
      <description>&lt;P&gt;Hi Wrangler2x. &lt;BR /&gt;
The feature existed on splunk 6.1.4&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.1.4/Data/MonitorWindowsdata"&gt;http://docs.splunk.com/Documentation/Splunk/6.1.4/Data/MonitorWindowsdata&lt;/A&gt;&lt;BR /&gt;
it should be fine. &lt;/P&gt;

&lt;P&gt;can it be a typo in the string&lt;BR /&gt;&lt;BR /&gt;
check" 46 18," in the middle&lt;/P&gt;

&lt;P&gt;Or a text file encoding issue, try to edit the file with a code editor (notepad++ by example on window), and look for linebreaks or special characters.&lt;/P&gt;</description>
      <pubDate>Sat, 12 Dec 2015 00:07:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197267#M39191</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2015-12-12T00:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: input.conf whitelist for windows eventlogs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197268#M39192</link>
      <description>&lt;P&gt;The &lt;EM&gt;46 18&lt;/EM&gt; is in the copy from an msdos window to the splunk Answers page of the error output. In the actual whitelist above, you can see &lt;EM&gt;4618&lt;/EM&gt;. There are no embedded spaces in the whitelist anywhere. I have looked at the file in notepad++ and there are no embedded line breaks or special characters.&lt;/P&gt;

&lt;P&gt;I also just re-verified that this is 6.1.4, and it is a heavy forwarder.&lt;/P&gt;

&lt;P&gt;Also, the error is &lt;STRONG&gt;Invalid key in stanza&lt;/STRONG&gt; and that seems like it does not recognize the term &lt;EM&gt;whitelist&lt;/EM&gt;.&lt;/P&gt;</description>
      <pubDate>Sat, 12 Dec 2015 00:38:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197268#M39192</guid>
      <dc:creator>wrangler2x</dc:creator>
      <dc:date>2015-12-12T00:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: input.conf whitelist for windows eventlogs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197269#M39193</link>
      <description>&lt;P&gt;Did you ever find an answer to your issue? I am experiencing the same and can't seem to find any info online.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2016 13:06:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197269#M39193</guid>
      <dc:creator>Shayde_Nofziger</dc:creator>
      <dc:date>2016-03-23T13:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: input.conf whitelist for windows eventlogs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197270#M39194</link>
      <description>&lt;P&gt;No. I'm guessing that it is not actually supported until 6.3.x, which I have yet to upgrade to. In the meantime, I've gone back to using the old drop/pass via props.conf and transforms.conf, like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventCodeSecDrop]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[WinEventCodeSecPass]
REGEX = (?m)^EventCode=(512|513|517|520|528|529|530|531|532|533|534|535|539|540|624|625|626|632|636|659|642|643|644|660|675|676|671|672|680|681|1100|1102|1104|1108|4612|4616|4618|4624|4625|4634|4720|4728|4729|4732|4733|4738|4740|4756|4757|4767|4768|4771|4772|4776|5461)[^0-9]
DEST_KEY = queue
FORMAT = indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 23 Mar 2016 20:26:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197270#M39194</guid>
      <dc:creator>wrangler2x</dc:creator>
      <dc:date>2016-03-23T20:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: input.conf whitelist for windows eventlogs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197271#M39195</link>
      <description>&lt;P&gt;Try using:&lt;/P&gt;

&lt;P&gt;[WinEventLog://Security]&lt;/P&gt;

&lt;P&gt;instead of:&lt;/P&gt;

&lt;P&gt;[WinEventLog:Security]&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 16:39:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/input-conf-whitelist-for-windows-eventlogs/m-p/197271#M39195</guid>
      <dc:creator>spayneort</dc:creator>
      <dc:date>2016-05-12T16:39:15Z</dc:date>
    </item>
  </channel>
</rss>

