<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filtering events and Windows Platform Filtering events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91068#M23433</link>
    <description>&lt;P&gt;[WinEventLog] inputs, whitelist / blacklist.&lt;/P&gt;</description>
    <pubDate>Wed, 09 Oct 2013 19:31:19 GMT</pubDate>
    <dc:creator>sowings</dc:creator>
    <dc:date>2013-10-09T19:31:19Z</dc:date>
    <item>
      <title>Filtering events and Windows Platform Filtering events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91062#M23427</link>
      <description>&lt;P&gt;When adding a new filter to props.conf and transforms.conf does it remove events that have already been indexed or only new incoming events?&lt;/P&gt;

&lt;P&gt;We are attempting to filter out all "Windows Platform Filtering" events.  Is there a regex to do this, or will we need to have a regex for each Event Code?&lt;/P&gt;

&lt;P&gt;From a previous question I was given:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(?msi)^EventCode=5156D
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If I search "EventCode=5156" there's plenty of results.&lt;/P&gt;

&lt;P&gt;I am attempting to search via:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| regex _raw=(?msi)^EventCode=5156D
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I am unable to find anything&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2013 18:30:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91062#M23427</guid>
      <dc:creator>ejdavis</dc:creator>
      <dc:date>2013-10-09T18:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering events and Windows Platform Filtering events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91063#M23428</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;| regex _raw=(?msi)^EventCode=5156\D
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I think it was missing a \ before the D.&lt;BR /&gt;
You can also run this without the \D&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| regex _raw=(?msi)^EventCode=5156
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 09 Oct 2013 18:35:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91063#M23428</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-10-09T18:35:13Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering events and Windows Platform Filtering events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91064#M23429</link>
      <description>&lt;P&gt;I'm still unable to find any results via search with either of those regex expressions&lt;/P&gt;

&lt;P&gt;But I am able to see thousands of events when I search, "EventCode=5156"&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2013 18:49:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91064#M23429</guid>
      <dc:creator>ejdavis</dc:creator>
      <dc:date>2013-10-09T18:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering events and Windows Platform Filtering events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91065#M23430</link>
      <description>&lt;P&gt;It will never remove anything from the index. You have to use the cli clear command. Technically, even "| delete" doesnt remove it from the index (masks it). &lt;/P&gt;

&lt;P&gt;To filter out multiple events, see this post:&lt;BR /&gt;
&lt;A href="http://answers.splunk.com/answers/59370/filtering-events-using-nullqueue"&gt;http://answers.splunk.com/answers/59370/filtering-events-using-nullqueue&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2013 18:52:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91065#M23430</guid>
      <dc:creator>gregbujak</dc:creator>
      <dc:date>2013-10-09T18:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering events and Windows Platform Filtering events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91066#M23431</link>
      <description>&lt;P&gt;Splunk's latest release, version 6, builds event ID filtering into the WinEventLog inputs. See &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf"&gt;inputs.conf documentation&lt;/A&gt; for more details.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2013 19:02:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91066#M23431</guid>
      <dc:creator>sowings</dc:creator>
      <dc:date>2013-10-09T19:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering events and Windows Platform Filtering events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91067#M23432</link>
      <description>&lt;P&gt;I just tested &lt;BR /&gt;
| regex _raw=(?msi)^EventCode=5156&lt;BR /&gt;
and it worked.  You can also use&lt;BR /&gt;
| regex EventCode=5156&lt;BR /&gt;
I looked at the most recent inputs.conf information, but I did not see what sowings was refering to.  I'm sure it is there, but will take some reading.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2013 19:21:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91067#M23432</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-10-09T19:21:52Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering events and Windows Platform Filtering events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91068#M23433</link>
      <description>&lt;P&gt;[WinEventLog] inputs, whitelist / blacklist.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2013 19:31:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91068#M23433</guid>
      <dc:creator>sowings</dc:creator>
      <dc:date>2013-10-09T19:31:19Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering events and Windows Platform Filtering events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91069#M23434</link>
      <description>&lt;P&gt;Well that does look easy.&lt;BR /&gt;
If you are running Splunk6&lt;BR /&gt;
Try adding&lt;BR /&gt;
blacklist = 5156&lt;BR /&gt;
to your inputs.conf stanza for the wmi:wineventlog:security source.  And thank sowings.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2013 19:38:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-events-and-Windows-Platform-Filtering-events/m-p/91069#M23434</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-10-09T19:38:56Z</dc:date>
    </item>
  </channel>
</rss>

