<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How can I filter windows XML event logs? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-can-I-filter-windows-XML-event-logs/m-p/337849#M62373</link>
    <description>&lt;P&gt;It turned out that this can't be done. When you filter Windows XML event logs through inputs.conf not all fields can be used that are listed in the documentation: &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.6.2/Admin/Inputsconf#Event_Log_whitelist_and_blacklist_formats"&gt;http://docs.splunk.com/Documentation/Splunk/6.6.2/Admin/Inputsconf#Event_Log_whitelist_and_blacklist_formats&lt;/A&gt;&lt;BR /&gt;
(for example "Message" field is not available as a key but "EvenctCode" is)&lt;BR /&gt;
In this case the only solution is nullqueue filtering.&lt;/P&gt;</description>
    <pubDate>Thu, 20 Jul 2017 07:11:03 GMT</pubDate>
    <dc:creator>nembela</dc:creator>
    <dc:date>2017-07-20T07:11:03Z</dc:date>
    <item>
      <title>How can I filter windows XML event logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-can-I-filter-windows-XML-event-logs/m-p/337848#M62372</link>
      <description>&lt;P&gt;I have the following inputs.conf stanza:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 0
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 0
checkpointInterval = 5
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"
blacklist2 = EventCode="^(4624|4634)$"
index = wineventlog
renderXml=true
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It works fine and filters out eventcodes 4624 and 4634, but I'd like to filter these events only when LogonType equals 3. Since there is no Message field in XML event logs, I don't know how add this condition to blacklist2.&lt;BR /&gt;
Any idea?&lt;/P&gt;

&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 20:27:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-can-I-filter-windows-XML-event-logs/m-p/337848#M62372</guid>
      <dc:creator>nembela</dc:creator>
      <dc:date>2017-06-06T20:27:06Z</dc:date>
    </item>
    <item>
      <title>Re: How can I filter windows XML event logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-can-I-filter-windows-XML-event-logs/m-p/337849#M62373</link>
      <description>&lt;P&gt;It turned out that this can't be done. When you filter Windows XML event logs through inputs.conf not all fields can be used that are listed in the documentation: &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.6.2/Admin/Inputsconf#Event_Log_whitelist_and_blacklist_formats"&gt;http://docs.splunk.com/Documentation/Splunk/6.6.2/Admin/Inputsconf#Event_Log_whitelist_and_blacklist_formats&lt;/A&gt;&lt;BR /&gt;
(for example "Message" field is not available as a key but "EvenctCode" is)&lt;BR /&gt;
In this case the only solution is nullqueue filtering.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2017 07:11:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-can-I-filter-windows-XML-event-logs/m-p/337849#M62373</guid>
      <dc:creator>nembela</dc:creator>
      <dc:date>2017-07-20T07:11:03Z</dc:date>
    </item>
  </channel>
</rss>

