<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How do I index only critical events? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435260#M75938</link>
    <description>&lt;P&gt;I'm trying to use advanced whitefilter, but I'm coming up short. Basically, I want to index all Windows event logs that have a Type of Critical. I see EventType and Type, but both aren't what I'm looking for. &lt;/P&gt;

&lt;P&gt;Perhaps I can do transforms?&lt;/P&gt;</description>
    <pubDate>Mon, 28 Jan 2019 20:20:58 GMT</pubDate>
    <dc:creator>tmontney</dc:creator>
    <dc:date>2019-01-28T20:20:58Z</dc:date>
    <item>
      <title>How do I index only critical events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435260#M75938</link>
      <description>&lt;P&gt;I'm trying to use advanced whitefilter, but I'm coming up short. Basically, I want to index all Windows event logs that have a Type of Critical. I see EventType and Type, but both aren't what I'm looking for. &lt;/P&gt;

&lt;P&gt;Perhaps I can do transforms?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jan 2019 20:20:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435260#M75938</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2019-01-28T20:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: How do I index only critical events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435261#M75939</link>
      <description>&lt;P&gt;Assuming you are using Universal Forwarders on your Windows servers, you could use the blacklist facility in &lt;CODE&gt;inputs.conf&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;For example the Splunk Add-on for Microsoft Windows comes with this blacklist by default for security log events:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 1
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 1
checkpointInterval = 5
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"
blacklist2 = EventCode="566" Message="Object Type:(?!\s*groupPolicyContainer)"
renderXml=false
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The reference documentation is here:  &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf#Event_Log_whitelist_and_blacklist_formats"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf#Event_Log_whitelist_and_blacklist_formats&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jan 2019 20:49:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435261#M75939</guid>
      <dc:creator>ccl0utier</dc:creator>
      <dc:date>2019-01-28T20:49:36Z</dc:date>
    </item>
    <item>
      <title>Re: How do I index only critical events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435262#M75940</link>
      <description>&lt;P&gt;Well, I see the field "Level" in the XML of most event logs. Splunk isn't pulling that field by default. If I could get this field working, I could do it this way but not sure how the rendering of XML comes into play.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jan 2019 21:31:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435262#M75940</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2019-01-28T21:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: How do I index only critical events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435263#M75941</link>
      <description>&lt;P&gt;What's your current setup to pull Windows Log Events into Splunk at the moment?&lt;BR /&gt;
What do the events look like?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jan 2019 21:33:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435263#M75941</guid>
      <dc:creator>ccl0utier</dc:creator>
      <dc:date>2019-01-28T21:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: How do I index only critical events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435264#M75942</link>
      <description>&lt;P&gt;Using the standard universal forwarder.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Application]
disabled = 0
index = wineventlog
interval = 60
whitelist = 1000, 1001, 11707, 11724
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Say for example I wanted to turn this into pulling only Critical level events. The Level field is numeric, always seems to be 1. I know it exists because I can see it in XML View in Event Log viewer, on a PC.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jan 2019 21:46:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435264#M75942</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2019-01-28T21:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: How do I index only critical events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435265#M75943</link>
      <description>&lt;P&gt;I assume you could use the severity_id or severity field?&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/6458i5421030C763B79F0/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;If not, can you provide an example of your event data and how you'd like to filter them?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jan 2019 22:00:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435265#M75943</guid>
      <dc:creator>ccl0utier</dc:creator>
      <dc:date>2019-01-28T22:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: How do I index only critical events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435266#M75944</link>
      <description>&lt;P&gt;If severity ID maps to Level, sure. I'm not seeing that referenced in the docs. Just take your event log and filter for Critical. That's all I'm looking for.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jan 2019 22:28:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435266#M75944</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2019-01-28T22:28:19Z</dc:date>
    </item>
    <item>
      <title>Re: How do I index only critical events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435267#M75945</link>
      <description>&lt;P&gt;I don't have any in my test env.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jan 2019 22:49:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435267#M75945</guid>
      <dc:creator>ccl0utier</dc:creator>
      <dc:date>2019-01-28T22:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: How do I index only critical events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435268#M75946</link>
      <description>&lt;P&gt;You can use any of them, like Error or Warning.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jan 2019 22:57:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435268#M75946</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2019-01-28T22:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: How do I index only critical events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435269#M75947</link>
      <description>&lt;P&gt;Not exactly what you are looking for, I know, but you could try to blacklist unwanted events instead and see if that works for you:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist = Type="(Information)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Alternatively, you could run a network trace to see if the level field is collected by the Splunk UF and in what form and then whitelist only that.  I'll try to set that up in my lab and see what I get.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jan 2019 13:59:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-index-only-critical-events/m-p/435269#M75947</guid>
      <dc:creator>ccl0utier</dc:creator>
      <dc:date>2019-01-30T13:59:56Z</dc:date>
    </item>
  </channel>
</rss>

