<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to forward only specific Windows eventlogs via Splunk Universal forwarder in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-forward-only-specific-Windows-eventlogs-via-Splunk/m-p/41569#M7736</link>
    <description>&lt;P&gt;I need to monitor only logs with Event code = 5410,6913.&lt;BR /&gt;
How can i setup this in forwarder ?&lt;BR /&gt;
please suggest some help&lt;/P&gt;</description>
    <pubDate>Wed, 21 Aug 2013 12:53:50 GMT</pubDate>
    <dc:creator>chimbudp</dc:creator>
    <dc:date>2013-08-21T12:53:50Z</dc:date>
    <item>
      <title>How to forward only specific Windows eventlogs via Splunk Universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-forward-only-specific-Windows-eventlogs-via-Splunk/m-p/41569#M7736</link>
      <description>&lt;P&gt;I need to monitor only logs with Event code = 5410,6913.&lt;BR /&gt;
How can i setup this in forwarder ?&lt;BR /&gt;
please suggest some help&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 12:53:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-forward-only-specific-Windows-eventlogs-via-Splunk/m-p/41569#M7736</guid>
      <dc:creator>chimbudp</dc:creator>
      <dc:date>2013-08-21T12:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to forward only specific Windows eventlogs via Splunk Universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-forward-only-specific-Windows-eventlogs-via-Splunk/m-p/41570#M7737</link>
      <description>&lt;P&gt;This is what the book says to do...&lt;/P&gt;

&lt;P&gt;On the forwarder, you need to enable the WinEventLog:Security input.&lt;/P&gt;

&lt;P&gt;On the indexer you need to create entries in your system/local/props.conf and system/local/transforms.conf&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;P&gt;[source::*:Security]&lt;/P&gt;

&lt;P&gt;TRANSFORMS-set=setnull,setparsing&lt;/P&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;P&gt;[setnull]&lt;/P&gt;

&lt;P&gt;REGEX =  .&lt;/P&gt;

&lt;P&gt;DEST_KEY = queue&lt;/P&gt;

&lt;P&gt;FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;[setparsing]&lt;/P&gt;

&lt;P&gt;REGEX =(?m)^EventCode=(5410|6913)&lt;/P&gt;

&lt;P&gt;DEST_KEY = queue&lt;/P&gt;

&lt;P&gt;FORMAT = indexQueue&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 13:31:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-forward-only-specific-Windows-eventlogs-via-Splunk/m-p/41570#M7737</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-08-21T13:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to forward only specific Windows eventlogs via Splunk Universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-forward-only-specific-Windows-eventlogs-via-Splunk/m-p/41571#M7738</link>
      <description>&lt;P&gt;the docs are at &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Deploy/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Deploy/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 14:10:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-forward-only-specific-Windows-eventlogs-via-Splunk/m-p/41571#M7738</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-08-21T14:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to forward only specific Windows eventlogs via Splunk Universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-forward-only-specific-Windows-eventlogs-via-Splunk/m-p/41572#M7739</link>
      <description>&lt;P&gt;As of Splunk 6, there is a simpler way to filter which Windows events are forwarded by Splunk.&lt;/P&gt;

&lt;P&gt;See whitelist and blacklist in the "Windows Event Log Monitor" section of the following doc:  &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/admin/Inputsconf"&gt;http://docs.splunk.com/Documentation/Splunk/latest/admin/Inputsconf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Mar 2014 03:20:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-forward-only-specific-Windows-eventlogs-via-Splunk/m-p/41572#M7739</guid>
      <dc:creator>sbrant_splunk</dc:creator>
      <dc:date>2014-03-11T03:20:05Z</dc:date>
    </item>
  </channel>
</rss>

