<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filter windows events in Splunk in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203304#M187631</link>
    <description>&lt;P&gt;system local configuration persist over ALL&lt;/P&gt;</description>
    <pubDate>Thu, 31 Dec 2015 09:05:10 GMT</pubDate>
    <dc:creator>jmallorquin</dc:creator>
    <dc:date>2015-12-31T09:05:10Z</dc:date>
    <item>
      <title>Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203290#M187617</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;
Can someone write here the steps and what files do i have to edit in order filter windows events ?&lt;BR /&gt;
Tnx&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 14:20:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203290#M187617</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-30T14:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203291#M187618</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Here you have a good example&lt;BR /&gt;
&lt;A href="https://answers.splunk.com/answers/335000/how-could-i-filter-network-firewall-data-using-a-f.html#answer-335003"&gt;https://answers.splunk.com/answers/335000/how-could-i-filter-network-firewall-data-using-a-f.html#answer-335003&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Hope help you&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 14:26:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203291#M187618</guid>
      <dc:creator>jmallorquin</dc:creator>
      <dc:date>2015-12-30T14:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203292#M187619</link>
      <description>&lt;P&gt;Tnx for quick reply,appreciate it!&lt;BR /&gt;
i configured the following config in inputs.conf :&lt;/P&gt;

&lt;P&gt;host = mysplunk&lt;BR /&gt;
[splunktcp://9997]&lt;BR /&gt;
[WinEventLog:System]&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;H1&gt;only index events with these event IDs.&lt;/H1&gt;

&lt;P&gt;whitelist = 7036-7037&lt;/P&gt;

&lt;H1&gt;exclude these event IDs from being indexed.&lt;/H1&gt;

&lt;P&gt;blacklist = 0-7035,7037-10000&lt;BR /&gt;
[WinEventLog:Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
whitelist = 0-1&lt;BR /&gt;
blacklist = 4725-4800&lt;BR /&gt;
I configured it in /opt/splunk/etc/system/local/inputs.conf , restarted splunk and still get unrelevant events&lt;BR /&gt;
i copied to the /opt/splunk/etc/apps/Splunk_TA_windows/local/inputs.conf and to   /opt/splunk/etc/apps/splunk_app_windows_infrastructure/local/inputs.conf , restarted splunk and still the same&lt;BR /&gt;
 Do i have to edit props.conf and transforms.conf  ?&lt;BR /&gt;
Tnx in advance &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:14:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203292#M187619</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2020-09-29T08:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203293#M187620</link>
      <description>&lt;P&gt;Hey vad34,&lt;/P&gt;

&lt;P&gt;You can use something like this in your inputs.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled=0
current_only=1
blacklist1=EventCode="4662" Message=”Object Type:\s+(?!groupPolicyContainer)”
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The reference I'm grabbing from is this blog post:&lt;BR /&gt;
&lt;A href="http://blogs.splunk.com/2014/05/23/controlling-4662-messages-in-the-windows-security-event-log/"&gt;http://blogs.splunk.com/2014/05/23/controlling-4662-messages-in-the-windows-security-event-log/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;This is a little more elegant, but it's specific to WinEventLog data. jmallorquin's solution is universal to any data source.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 17:33:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203293#M187620</guid>
      <dc:creator>sover</dc:creator>
      <dc:date>2015-12-30T17:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203294#M187621</link>
      <description>&lt;P&gt;i followed the blog, i don't have group policy  so i configured this:&lt;/P&gt;

&lt;P&gt;[WinEventLog:Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
current_only=1&lt;BR /&gt;
blacklist1=EventCode="4726"&lt;BR /&gt;
 but still getting the events in splunk&lt;BR /&gt;
any ideas?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 18:36:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203294#M187621</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-30T18:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203295#M187622</link>
      <description>&lt;P&gt;Silly question –&amp;nbsp;have you restarted the forwarder?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 18:41:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203295#M187622</guid>
      <dc:creator>sover</dc:creator>
      <dc:date>2015-12-30T18:41:35Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203296#M187623</link>
      <description>&lt;P&gt;Yes , I restarted the whole splunk server&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 19:38:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203296#M187623</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-30T19:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203297#M187624</link>
      <description>&lt;P&gt;The above looks good.  try running this command&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;   ./splunk cmd btool inputs list --debug
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and checking the output to see if the inputs arent being overruled by another blacklist setting in conf files in other splunk apps.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 19:57:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203297#M187624</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2015-12-30T19:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203298#M187625</link>
      <description>&lt;P&gt;Other silly question... what versión of universal forwarder are you running?&lt;/P&gt;

&lt;P&gt;If you still have problems use my method &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 08:46:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203298#M187625</guid>
      <dc:creator>jmallorquin</dc:creator>
      <dc:date>2015-12-31T08:46:22Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203299#M187626</link>
      <description>&lt;P&gt;Hi ,  the version is 6.3.2&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 08:49:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203299#M187626</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-31T08:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203300#M187627</link>
      <description>&lt;P&gt;And your stanza is &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security] OR [WinEventLog://Security]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Becouse the first one is incorrect&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 08:53:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203300#M187627</guid>
      <dc:creator>jmallorquin</dc:creator>
      <dc:date>2015-12-31T08:53:08Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203301#M187628</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt;
Here is the output fragment of the debug command,&lt;BR /&gt;
host = splunk-102&lt;BR /&gt;
/opt/splunk/etc/apps/Splunk_TA_windows/default/inputs.conf             index = w                                                                                                             indows&lt;BR /&gt;
/opt/splunk/etc/apps/Splunk_TA_windows/default/inputs.conf             interval                                                                                                              = 600&lt;BR /&gt;
/opt/splunk/etc/apps/splunk_httpinput/default/inputs.conf              maxSocket                                                                                                             s = 0&lt;BR /&gt;
/opt/splunk/etc/apps/splunk_httpinput/default/inputs.conf              maxThread                                                                                                             s = 0&lt;BR /&gt;
/opt/splunk/etc/apps/splunk_httpinput/default/inputs.conf              port = 80                                                                                                             88&lt;BR /&gt;
/opt/splunk/etc/apps/Splunk_TA_windows/default/inputs.conf             type = po                                                                                                             rt&lt;BR /&gt;
/opt/splunk/etc/apps/splunk_httpinput/default/inputs.conf              useDeploy                                                                                                             mentServer = 0&lt;BR /&gt;
/opt/splunk/etc/apps/Splunk_TA_windows/default/inputs.conf             [WinPrint                                                                                                             Mon://printer]&lt;BR /&gt;
/opt/splunk/etc/system/default/inputs.conf                             _rcvbuf =                                                                                                              1572864&lt;BR /&gt;
/opt/splunk/etc/apps/Splunk_TA_windows/default/inputs.conf             baseline                                                                                                              = 1&lt;BR /&gt;
/opt/splunk/etc/apps/splunk_httpinput/default/inputs.conf              dedicated                                                                                                             IoThreads = 2&lt;BR /&gt;
/opt/splunk/etc/apps/Splunk_TA_windows/default/inputs.conf             disabled                                                                                                              = 1&lt;BR /&gt;
/opt/splunk/etc/apps/splunk_httpinput/default/inputs.conf              enableSSL                                                                                                              = 1&lt;BR /&gt;
/opt/splunk/etc/apps/Splunk_TA_windows/default/inputs.conf             evt_dc_na                                                                                                             me =&lt;BR /&gt;
/opt/splunk/etc/apps/Splunk_TA_windows/default/inputs.conf             evt_dns_n                                                                                                             ame =&lt;BR /&gt;
host = splunk-102&lt;BR /&gt;
How can i define if the input arent being overruled?&lt;/P&gt;

&lt;P&gt;Tnx&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:14:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203301#M187628</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2020-09-29T08:14:34Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203302#M187629</link>
      <description>&lt;P&gt;my stanza is  [WinEventLog:Security] , i will correct it now and check, update soon.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 09:01:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203302#M187629</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-31T09:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203303#M187630</link>
      <description>&lt;P&gt;btw , only need to edit in /opt/splunk/etc/system/local/inputs.conf or also in win app - /opt/splunk/etc/apps/splunk_app_windows_infrastructure  and in /opt/splunk/etc/apps/Splunk_TA_windows ?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:14:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203303#M187630</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2020-09-29T08:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203304#M187631</link>
      <description>&lt;P&gt;system local configuration persist over ALL&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 09:05:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203304#M187631</guid>
      <dc:creator>jmallorquin</dc:creator>
      <dc:date>2015-12-31T09:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: Filter windows events in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203305#M187632</link>
      <description>&lt;P&gt;Ok will correct it now and update you..&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 09:08:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-windows-events-in-Splunk/m-p/203305#M187632</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-31T09:08:52Z</dc:date>
    </item>
  </channel>
</rss>

