<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Monitor Windows Event Log for Critical/Error in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Monitor-Windows-Event-Log-for-Critical-Error/m-p/502991#M85677</link>
    <description>&lt;P&gt;I want to monitor certain events &lt;STRONG&gt;and&lt;/STRONG&gt; all Error/Critical level events.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/663023/how-to-monitor-wineventlogsystem-event-logs-for-cr.html"&gt;https://answers.splunk.com/answers/663023/how-to-monitor-wineventlogsystem-event-logs-for-cr.html&lt;/A&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Application]
disabled = 0
index = wineventlog
interval = 60
whitelist = 1000, 1001, 11707, 11724, 104
whitelist2 = Type="^[1|2]"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Tried it with and without &lt;CODE&gt;whitelist&lt;/CODE&gt; commented out (thinking it was overriding it).  It isn't picking up the events.&lt;/P&gt;</description>
    <pubDate>Wed, 25 Mar 2020 15:19:16 GMT</pubDate>
    <dc:creator>tmontney</dc:creator>
    <dc:date>2020-03-25T15:19:16Z</dc:date>
    <item>
      <title>Monitor Windows Event Log for Critical/Error</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Monitor-Windows-Event-Log-for-Critical-Error/m-p/502991#M85677</link>
      <description>&lt;P&gt;I want to monitor certain events &lt;STRONG&gt;and&lt;/STRONG&gt; all Error/Critical level events.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/663023/how-to-monitor-wineventlogsystem-event-logs-for-cr.html"&gt;https://answers.splunk.com/answers/663023/how-to-monitor-wineventlogsystem-event-logs-for-cr.html&lt;/A&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Application]
disabled = 0
index = wineventlog
interval = 60
whitelist = 1000, 1001, 11707, 11724, 104
whitelist2 = Type="^[1|2]"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Tried it with and without &lt;CODE&gt;whitelist&lt;/CODE&gt; commented out (thinking it was overriding it).  It isn't picking up the events.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 15:19:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Monitor-Windows-Event-Log-for-Critical-Error/m-p/502991#M85677</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2020-03-25T15:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor Windows Event Log for Critical/Error</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Monitor-Windows-Event-Log-for-Critical-Error/m-p/502992#M85678</link>
      <description>&lt;P&gt;This is the correct stanza:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Application]
disabled = 0
index = wineventlog
whitelist1 = EventCode="1000|1001|11707|11724|104"
whitelist2 = Type="^[Error|Critical]" 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;1) Whitelists/blacklists can use only one format (standard or regular expression), not both at the same time: &lt;A href="https://answers.splunk.com/answers/563657/wineventlog-whitelisting-by-sourcename-not-working.html"&gt;https://answers.splunk.com/answers/563657/wineventlog-whitelisting-by-sourcename-not-working.html&lt;/A&gt;&lt;BR /&gt;
2) Type must be the enum name not the value. I originally thought it would be the value because that's how it appears in XML.&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 19:26:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Monitor-Windows-Event-Log-for-Critical-Error/m-p/502992#M85678</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2020-05-06T19:26:38Z</dc:date>
    </item>
  </channel>
</rss>

