<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How does the indexer forward data to itself? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354540#M64849</link>
    <description>&lt;P&gt;Ok.. than for local monitoring on your indexer server itself, you need to restart splunkd service after you make the change.&lt;/P&gt;</description>
    <pubDate>Tue, 06 Feb 2018 16:20:06 GMT</pubDate>
    <dc:creator>somesoni2</dc:creator>
    <dc:date>2018-02-06T16:20:06Z</dc:date>
    <item>
      <title>How does the indexer forward data to itself?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354537#M64846</link>
      <description>&lt;P&gt;I want to blacklist some events that the Splunk server is sending to itself but my indexer isn't even running the SplunkForwarder Service and the inputs.conf file that I'd edit on my other servers doesn't effect what it's sending to itself.&lt;BR /&gt;
Does it use an inputs.conf file in a different location?&lt;BR /&gt;
Also, since it's not running the SplunkForwarder Service, what do I restart (if anything) after I edit the correct inputs.conf? Do I have to restart the Splunkd Service (ie: splunk itself)?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 16:39:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354537#M64846</guid>
      <dc:creator>benbabich</dc:creator>
      <dc:date>2018-02-02T16:39:43Z</dc:date>
    </item>
    <item>
      <title>Re: How does the indexer forward data to itself?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354538#M64847</link>
      <description>&lt;P&gt;Splunk Indexer would have Splunk Enterprise version/product installed on it which would have full capabilities of Splunk including indexing and monitoring. The service name would be splunkd and it should be restarted when you make changes to inputs.conf. Side question, do you have indexer cluster OR use deployment server  to deployment configs?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 18:51:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354538#M64847</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2018-02-02T18:51:12Z</dc:date>
    </item>
    <item>
      <title>Re: How does the indexer forward data to itself?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354539#M64848</link>
      <description>&lt;P&gt;Its not a cluster. And I do not use a separate deployment server, I use the same server for that.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2018 16:04:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354539#M64848</guid>
      <dc:creator>benbabich</dc:creator>
      <dc:date>2018-02-06T16:04:18Z</dc:date>
    </item>
    <item>
      <title>Re: How does the indexer forward data to itself?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354540#M64849</link>
      <description>&lt;P&gt;Ok.. than for local monitoring on your indexer server itself, you need to restart splunkd service after you make the change.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2018 16:20:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354540#M64849</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2018-02-06T16:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: How does the indexer forward data to itself?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354541#M64850</link>
      <description>&lt;P&gt;Hi benbabich,&lt;BR /&gt;
which events do you want to blacklist? internal events? &lt;BR /&gt;
if internal events, remember that they aren't in the license consuption.&lt;BR /&gt;
Anyway, You can filter them in $SPLUNK_HOME/etc/system/local&lt;/P&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2018 16:25:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354541#M64850</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2018-02-06T16:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: How does the indexer forward data to itself?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354542#M64851</link>
      <description>&lt;P&gt;I turned on auditing for .exe's so I can see psexec usage on servers. So I'm looking for some 4688 events (in windows security logs).I block most but I want to see the following:&lt;BR /&gt;
whitelist2 = EventCode="4688" Message="(?:New Process Name:).+(?:cmd.exe)"&lt;BR /&gt;
whitelist3 = EventCode="4688" Message="(?:New Process Name:).+(?:cscript.exe)"&lt;BR /&gt;
whitelist4 = EventCode="4688" Message="(?:New Process Name:).+(?:wscript.exe)"&lt;BR /&gt;
whitelist5 = EventCode="4688" Message="(?:New Process Name:).+(?:PsExec.exe)"&lt;BR /&gt;
whitelist6 = EventCode="4688" Message="(?:Process Command Line:).+(?:cscript.exe?)"&lt;/P&gt;

&lt;P&gt;It works on my servers but my Splunk indexer server now reports EVERY 4688 event (any .exe that is opened which is 100+ a minute) and I've added &lt;BR /&gt;
blacklist1 = EventCode="4688"&lt;BR /&gt;
to every inputs.conf file I can find on the server (including $SPLUNK_HOME/etc/system/local) and I can't get it to stop reporting 4688 events. I could just use host!=[servername] in a search head to not see those results but I'd rather just find a way to stop it entirely.  &lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2018 18:23:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-does-the-indexer-forward-data-to-itself/m-p/354542#M64851</guid>
      <dc:creator>benbabich</dc:creator>
      <dc:date>2018-02-06T18:23:04Z</dc:date>
    </item>
  </channel>
</rss>

