<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do you filter out an event based on an account name? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-do-you-filter-out-an-event-based-on-an-account-name/m-p/398265#M71005</link>
    <description>&lt;P&gt;Thanks for the reply.&lt;BR /&gt;
based on the docs, this means that i need to add this configuration for props.conf and transforms.conf, under $SPLUNK_HOME/etc/system/local/.&lt;BR /&gt;
Im based on the "Filter WMI and Event Log events" on the doc.&lt;BR /&gt;
Is that correct?&lt;/P&gt;</description>
    <pubDate>Tue, 26 Feb 2019 14:08:10 GMT</pubDate>
    <dc:creator>alexandrosd</dc:creator>
    <dc:date>2019-02-26T14:08:10Z</dc:date>
    <item>
      <title>How do you filter out an event based on an account name?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-you-filter-out-an-event-based-on-an-account-name/m-p/398263#M71003</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I am trying to exclude specific event logs from a Windows system being forwarded and indexed to Splunk.&lt;/P&gt;

&lt;P&gt;What I need to do is to filter out an event based on the content of the event (actually for a specific user called installer).&lt;/P&gt;

&lt;P&gt;What i did so far is:&lt;/P&gt;

&lt;P&gt;Under props.conf of universal forwarder ($PROGRAMFILES\SplunkUniversalForwarder\etc\apps\SplunkUniversalForwarder\local\props.conf) I defined the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]

TRANSFORMS-t1=exclude-installer
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and under transforms.conf on the same path the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[exclude-installer]
REGEX=(?s)(Account Name:\s\sinstaller)
DEST_KEY=queue
FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The problem is that this specific configuration does not work. Events are not filtered out...&lt;/P&gt;

&lt;P&gt;Any suggestions?&lt;/P&gt;

&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 12:08:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-you-filter-out-an-event-based-on-an-account-name/m-p/398263#M71003</guid>
      <dc:creator>alexandrosd</dc:creator>
      <dc:date>2019-02-26T12:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: How do you filter out an event based on an account name?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-you-filter-out-an-event-based-on-an-account-name/m-p/398264#M71004</link>
      <description>&lt;P&gt;Hi alexandrosd ,&lt;/P&gt;

&lt;P&gt;unfortunately you can not directly filter/route to null queue on your universal forwarder, since the universal forwarder does not parse the events so it's not able to apply props.conf / transforms.conf transformations. &lt;/P&gt;

&lt;P&gt;Only a heavy-forwarder/indexer is parsing the data and is able to filter the events. &lt;/P&gt;

&lt;P&gt;Depending on your architecture you would most likely want simply want to move your configuration to your indexer(s) if there is no heavy forwarder inbetween your universal forwarder and indexer tier. &lt;/P&gt;

&lt;P&gt;More to read: &lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.4/Forwarding/Routeandfilterdatad"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.4/Forwarding/Routeandfilterdatad&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;&lt;A href="https://wiki.splunk.com/Community:HowIndexingWorks"&gt;https://wiki.splunk.com/Community:HowIndexingWorks&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Edit&lt;/STRONG&gt;: &lt;BR /&gt;
Since you are dealing with Windows Event Logs you can apply a so called backlist in your inputs.conf on your Universal Forwarder: &lt;/P&gt;

&lt;P&gt;Something like &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security] 
...
blacklist1 = EventCode="your eventcode" Account_Name="installer"
...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Search for "blacklist" here: &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.4/Data/MonitorWindowseventlogdata"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.4/Data/MonitorWindowseventlogdata&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Sincerely, &lt;BR /&gt;
hgrow&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 14:00:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-you-filter-out-an-event-based-on-an-account-name/m-p/398264#M71004</guid>
      <dc:creator>hgrow</dc:creator>
      <dc:date>2019-02-26T14:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: How do you filter out an event based on an account name?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-you-filter-out-an-event-based-on-an-account-name/m-p/398265#M71005</link>
      <description>&lt;P&gt;Thanks for the reply.&lt;BR /&gt;
based on the docs, this means that i need to add this configuration for props.conf and transforms.conf, under $SPLUNK_HOME/etc/system/local/.&lt;BR /&gt;
Im based on the "Filter WMI and Event Log events" on the doc.&lt;BR /&gt;
Is that correct?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 14:08:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-you-filter-out-an-event-based-on-an-account-name/m-p/398265#M71005</guid>
      <dc:creator>alexandrosd</dc:creator>
      <dc:date>2019-02-26T14:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: How do you filter out an event based on an account name?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-you-filter-out-an-event-based-on-an-account-name/m-p/398266#M71006</link>
      <description>&lt;P&gt;Hello hgrow,&lt;BR /&gt;
seems that the config on the indexer works perfect for me.&lt;BR /&gt;
Changes made under $SPLUNK_HOME/etc/system/local/ and restarted splunk and voila.&lt;/P&gt;

&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 14:58:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-you-filter-out-an-event-based-on-an-account-name/m-p/398266#M71006</guid>
      <dc:creator>alexandrosd</dc:creator>
      <dc:date>2019-02-26T14:58:58Z</dc:date>
    </item>
  </channel>
</rss>

