<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic WMI: filter remote Eventlogs by Host Groups in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39628#M7377</link>
    <description>&lt;P&gt;I would like to know wether it is possible to filter remote windows eventlog based on the groups inside wmi.conf.
I have a forwarder on a windows host, sending its messages to a linux box.
I defined a group server and a group active directory server.&lt;/P&gt;

&lt;P&gt;I want &lt;EM&gt;all&lt;/EM&gt; Security Eventlogs from the active directory group but only "Audit fails" from the other server group. EventCode 697 should never be forwarded.&lt;/P&gt;

&lt;P&gt;Filtering all is easy:
props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[wmi]
TRANSFORMS_wmi=wminull
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[wminull]
REGEX = (?m)^(EventCode=697|Type=Audit Success|Type=Success Audit)
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Filtering should be placed on the forwarder for licensing reasons.
Anyone has an idea how to to this?&lt;/P&gt;

&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Mon, 30 Aug 2010 17:44:53 GMT</pubDate>
    <dc:creator>Daniel</dc:creator>
    <dc:date>2010-08-30T17:44:53Z</dc:date>
    <item>
      <title>WMI: filter remote Eventlogs by Host Groups</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39628#M7377</link>
      <description>&lt;P&gt;I would like to know wether it is possible to filter remote windows eventlog based on the groups inside wmi.conf.
I have a forwarder on a windows host, sending its messages to a linux box.
I defined a group server and a group active directory server.&lt;/P&gt;

&lt;P&gt;I want &lt;EM&gt;all&lt;/EM&gt; Security Eventlogs from the active directory group but only "Audit fails" from the other server group. EventCode 697 should never be forwarded.&lt;/P&gt;

&lt;P&gt;Filtering all is easy:
props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[wmi]
TRANSFORMS_wmi=wminull
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[wminull]
REGEX = (?m)^(EventCode=697|Type=Audit Success|Type=Success Audit)
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Filtering should be placed on the forwarder for licensing reasons.
Anyone has an idea how to to this?&lt;/P&gt;

&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Aug 2010 17:44:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39628#M7377</guid>
      <dc:creator>Daniel</dc:creator>
      <dc:date>2010-08-30T17:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: WMI: filter remote Eventlogs by Host Groups</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39629#M7378</link>
      <description>&lt;P&gt;I am not sure what you mean by a "group" in wmi.conf? You mean different stanzas? If so, they will have different names, and you can filter on &lt;CODE&gt;wmi_type=StanzaNameWithoutWMIPrefix&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;However, I wonder if you have complicated this or basically, made things a lot more difficult for yourself by creating a different stanza for the same logs. It would be a lot better to filter on the host name, or report after the fact than to have a different sourcetype/source for WinEventLog:Security logs.&lt;/P&gt;

&lt;P&gt;Whether filtering occurs on the forwarder or the indexer has no effect on licensing. Transforms must occur where parsing occurs. (&lt;A href="http://www.splunk.com/wiki/Where_do_I_configure_my_Splunk_settings%3F" rel="nofollow"&gt;Here&lt;/A&gt;.) If the forwarder is a Light Forwarder, parsing occurs on the indexer, and therefore the transforms and configuration must be set on the indexer.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2010 13:08:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39629#M7378</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2010-08-31T13:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: WMI: filter remote Eventlogs by Host Groups</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39630#M7379</link>
      <description>&lt;P&gt;I think I mean different stanzas:&lt;BR /&gt;
[WMI:Servers]&lt;BR /&gt;
Disabled=0&lt;BR /&gt;
event_log_file = Application, Security, System&lt;BR /&gt;
interval = 5&lt;BR /&gt;
server = hostA,hostB...&lt;BR /&gt;
[WMI:AD]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
event_log_file = DFS Replication, Directory Service, DNS Server, File Replication Service, HardwareEvents,  Key Management Service, Security, System,  Application&lt;BR /&gt;
interval = 5&lt;BR /&gt;
server = HostF, HostG...&lt;/P&gt;

&lt;P&gt;As I habe to define the hostname in wmi.conf I thought I can use this definition soewhere else. So I need to filter by hostname but I want to define the hostname only once and not in several files.&lt;BR /&gt;
The forwarder is not the light one.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 09:17:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39630#M7379</guid>
      <dc:creator>Daniel</dc:creator>
      <dc:date>2020-09-28T09:17:00Z</dc:date>
    </item>
    <item>
      <title>Re: WMI: filter remote Eventlogs by Host Groups</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39631#M7380</link>
      <description>&lt;P&gt;ugly formatted..&lt;BR /&gt;
I´ll try the wmi_type - thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2010 14:20:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39631#M7380</guid>
      <dc:creator>Daniel</dc:creator>
      <dc:date>2010-08-31T14:20:26Z</dc:date>
    </item>
    <item>
      <title>Re: WMI: filter remote Eventlogs by Host Groups</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39632#M7381</link>
      <description>&lt;P&gt;I really recommend you have a different stanza for each log type, because I am pretty sure there is nothing else in the data that would indicate which file a particular log came from.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2010 14:46:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39632#M7381</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2010-08-31T14:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: WMI: filter remote Eventlogs by Host Groups</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39633#M7382</link>
      <description>&lt;P&gt;wmi_type is set to WinEventLog:Security - no way to filter on my stanza. I would say I have different stanzas for nearly each log type. I have one stanza with three log files and another one with nine. The only thing is that I want to have &lt;EM&gt;all&lt;/EM&gt; security logs from the second stanza and only failures from the first. I think I´m confused about stanzas and possible keys in the config files.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 09:17:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39633#M7382</guid>
      <dc:creator>Daniel</dc:creator>
      <dc:date>2020-09-28T09:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: WMI: filter remote Eventlogs by Host Groups</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39634#M7383</link>
      <description>&lt;P&gt;Finally I created two regex´ and defined the host twice..&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[wmi_non_ad_697_lf]
REGEX = (?msi)ComputerName=(?!hosta|hostb).+?(EventCode=697|Type=Audit Success|Type=Success Audit|Type=.berwachung erfolgreich)
DEST_KEY = queue
FORMAT = nullQueue

[wmi_ad_697_lf]
# Alle AD Server mit EventCode 697 fliegen raus
REGEX = (?msi)ComputerName=(?=hosta|hostb).+?(EventCode=697)
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Not very splunk, but works.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2010 21:55:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WMI-filter-remote-Eventlogs-by-Host-Groups/m-p/39634#M7383</guid>
      <dc:creator>Daniel</dc:creator>
      <dc:date>2010-08-31T21:55:11Z</dc:date>
    </item>
  </channel>
</rss>

