<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Reducing License usage by eliminating duplicate events from WIndows in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Reducing-License-usage-by-eliminating-duplicate-events-from/m-p/530131#M89260</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am looking for a way to reduce our license usage by eliminating duplicate events being forwarded from a windows DC. For example, event id 4624 (successful logon) generates a handful of events in windows for every logon and all of those are being sent to Splunk. Is there a regex we can use in the input.conf file to only allow one event to be logged maybe based on the timestamp or something? Here is what we are currently using:&lt;/P&gt;&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;disabled = 0&lt;BR /&gt;start_from = oldest&lt;BR /&gt;current_only = 0&lt;BR /&gt;evt_resolve_ad_obj = 0&lt;BR /&gt;checkpointInterval = 5&lt;BR /&gt;blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;blacklist2 = EventCode="566" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;renderXml=false&lt;BR /&gt;index = wineventlog&lt;BR /&gt;ignoreOlderThan = 2d&lt;BR /&gt;current_only=1&lt;BR /&gt;whitelist = EventCode = "4624"&lt;BR /&gt;blacklist1 = EventCode="4624" Message=".*[\S\s]*Account\sName:\s+[\S+]+[\$]"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;</description>
    <pubDate>Thu, 19 Nov 2020 21:26:36 GMT</pubDate>
    <dc:creator>gba8912</dc:creator>
    <dc:date>2020-11-19T21:26:36Z</dc:date>
    <item>
      <title>Reducing License usage by eliminating duplicate events from WIndows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Reducing-License-usage-by-eliminating-duplicate-events-from/m-p/530131#M89260</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am looking for a way to reduce our license usage by eliminating duplicate events being forwarded from a windows DC. For example, event id 4624 (successful logon) generates a handful of events in windows for every logon and all of those are being sent to Splunk. Is there a regex we can use in the input.conf file to only allow one event to be logged maybe based on the timestamp or something? Here is what we are currently using:&lt;/P&gt;&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;disabled = 0&lt;BR /&gt;start_from = oldest&lt;BR /&gt;current_only = 0&lt;BR /&gt;evt_resolve_ad_obj = 0&lt;BR /&gt;checkpointInterval = 5&lt;BR /&gt;blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;blacklist2 = EventCode="566" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;renderXml=false&lt;BR /&gt;index = wineventlog&lt;BR /&gt;ignoreOlderThan = 2d&lt;BR /&gt;current_only=1&lt;BR /&gt;whitelist = EventCode = "4624"&lt;BR /&gt;blacklist1 = EventCode="4624" Message=".*[\S\s]*Account\sName:\s+[\S+]+[\$]"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 21:26:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Reducing-License-usage-by-eliminating-duplicate-events-from/m-p/530131#M89260</guid>
      <dc:creator>gba8912</dc:creator>
      <dc:date>2020-11-19T21:26:36Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing License usage by eliminating duplicate events from WIndows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Reducing-License-usage-by-eliminating-duplicate-events-from/m-p/530158#M89262</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/228952"&gt;@gba8912&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you cannot remove duplicated events before indexing because to know that an event is already indexed you have to index it!&lt;/P&gt;&lt;P&gt;If you want to reduce your license consuption, at first, you can disable perfmon that are very verbose and reduce the execution of scripts.&lt;/P&gt;&lt;P&gt;Then run a simple search "&lt;EM&gt;index=wineventlog | stats count BY EventCode | sort -count"&lt;/EM&gt;&amp;nbsp;and identify the most present events, then identify the ones you don't need and then filter them following the steps at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.1.0/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.1.0/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 20 Nov 2020 07:32:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Reducing-License-usage-by-eliminating-duplicate-events-from/m-p/530158#M89262</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-11-20T07:32:27Z</dc:date>
    </item>
  </channel>
</rss>

