<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows Filtering Not Working in Knowledge Management</title>
    <link>https://community.splunk.com/t5/Knowledge-Management/Why-won-t-Windows-filter-work/m-p/647019#M9542</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253542"&gt;@caiosalonso&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;I've pushed the stanzas as you recommended but still not luck, I'm still getting event codes that I explicitly have blocklisted. I am going to try another ingest action that is limited to less event ids, but I still can't get it to pull a sample from the sourcetype.&lt;BR /&gt;&lt;BR /&gt;Do you know if it needs to pull a sample for the ingest action to work once implemented? Or is there something, like a component in internal logs, that tracks the ingest action actually working?&lt;/P&gt;</description>
    <pubDate>Wed, 14 Jun 2023 18:21:15 GMT</pubDate>
    <dc:creator>Charlie5</dc:creator>
    <dc:date>2023-06-14T18:21:15Z</dc:date>
    <item>
      <title>Why won't Windows filter work?</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Why-won-t-Windows-filter-work/m-p/646855#M9534</link>
      <description>&lt;P&gt;Hello Splunk Community,&lt;BR /&gt;&lt;BR /&gt;I am having some difficulty getting Windows event log filters to work properly. Whatever I have specified in the inputs.conf of Splunk_TA_windows is being ignored, I can tell because there are significant volumes of events present that are not in the whitelist stanzas. I have even tried blocklisting very large numbers of these unwanted event codes explicitly (in blacklist1) without success.&lt;/P&gt;
&lt;P&gt;I can see the app successfully deploy to my clients in internal logs when I push changes to the server class or add-on, and those that I have verified have these exact stanza settings on them are still sending event logs that are not on the whitelist or are explicitly blocklisted.&lt;BR /&gt;&lt;BR /&gt;I am using 8.6.0 of the Windows add-on and UFs on 8x and 9x versions (hundreds). To make matters worse, ingest actions are also not working properly, I have tried adding what is effectively the same regex as an the ingest action (blacklist1 on Splunk Cloud), but am still seeing these unwanted codes.&lt;BR /&gt;&lt;BR /&gt;Is anyone else having this problem, or am I doing something wrong? Also, I have the format as Xml (as I understand it XML logs are typically smaller in size then their non-XML counterparts. Does this mean in the advanced format filters I need to use "$XmlRegex=" or can I still use the EventCode=" regex?&lt;/P&gt;
&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;renderXml = true&lt;BR /&gt;whitelist1=EventCode="(4740|644|104|1100|4624|528|4625|529|4776|680|681|4720|624|4732|636|4728|632|4756|660|4771|675|4730|634|4734|638|4758|662|1102|517|4722|626|4726|630|4768|672|676|4769|673|4765|4766|5145)"&lt;BR /&gt;blacklist1=$XmlRegex="EventID&amp;gt;(53506|53504|40970|40962|40961|36928|... (this blocklist goes on and on)&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 00:36:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Why-won-t-Windows-filter-work/m-p/646855#M9534</guid>
      <dc:creator>Charlie5</dc:creator>
      <dc:date>2023-06-15T00:36:14Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Filtering Not Working</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Why-won-t-Windows-filter-work/m-p/646864#M9535</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have searched some documentation related to filtering Windows data, and I would reccomend you using the format with "&lt;SPAN&gt;$XmlRegex". Have you already tried using both whitelist and blacklist with the "$XmlRegex" option?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I guess your stanza should be something similar to:&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog://Security]
renderXml = true
whitelist1 = $XmlRegex="&amp;lt;EventID&amp;gt;(4740|644|104|1100|4624|528|4625|529|4776|680|681|4720|624|4732|636|4728|632|4756|660|4771|675|4730|634|4734|638|4758|662|1102|517|4722|626|4726|630|4768|672|676|4769|673|4765|4766|5145)&amp;lt;\/EventID&amp;gt;"
blacklist1 = $XmlRegex="&amp;lt;EventID&amp;gt;(53506|53504|40970|40962|40961|36928|...)&amp;lt;\/EventID&amp;gt;"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 20:39:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Why-won-t-Windows-filter-work/m-p/646864#M9535</guid>
      <dc:creator>caiosalonso</dc:creator>
      <dc:date>2023-06-13T20:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Filtering Not Working</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Why-won-t-Windows-filter-work/m-p/647008#M9541</link>
      <description>&lt;P&gt;Thank you for the suggestion, I will try switching to this format and let you know how it goes.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 16:50:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Why-won-t-Windows-filter-work/m-p/647008#M9541</guid>
      <dc:creator>Charlie5</dc:creator>
      <dc:date>2023-06-14T16:50:27Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Filtering Not Working</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Why-won-t-Windows-filter-work/m-p/647019#M9542</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253542"&gt;@caiosalonso&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;I've pushed the stanzas as you recommended but still not luck, I'm still getting event codes that I explicitly have blocklisted. I am going to try another ingest action that is limited to less event ids, but I still can't get it to pull a sample from the sourcetype.&lt;BR /&gt;&lt;BR /&gt;Do you know if it needs to pull a sample for the ingest action to work once implemented? Or is there something, like a component in internal logs, that tracks the ingest action actually working?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 18:21:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Why-won-t-Windows-filter-work/m-p/647019#M9542</guid>
      <dc:creator>Charlie5</dc:creator>
      <dc:date>2023-06-14T18:21:15Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Filtering Not Working</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Why-won-t-Windows-filter-work/m-p/647679#M9571</link>
      <description>&lt;P&gt;I've tried both, and rendering in non-XML format and filtering using the non-XML format for blacklists/whitelists, still no luck.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2023 20:18:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Why-won-t-Windows-filter-work/m-p/647679#M9571</guid>
      <dc:creator>Charlie5</dc:creator>
      <dc:date>2023-06-20T20:18:36Z</dc:date>
    </item>
  </channel>
</rss>

