<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157941#M44492</link>
    <description>&lt;P&gt;Mmm, I'm still getting the events with destination_address=192.168.x.x&lt;/P&gt;</description>
    <pubDate>Tue, 11 Aug 2015 07:40:10 GMT</pubDate>
    <dc:creator>pdjhh</dc:creator>
    <dc:date>2015-08-11T07:40:10Z</dc:date>
    <item>
      <title>How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157935#M44486</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;

&lt;P&gt;I am ingesting Windows event logs including event code 5156 which is chewing up a lot of license. I have had it turned off (as it is 'firewall permitted connection'), but we want to track connections from these hosts to external IP addresses so I have switched it back on. What I'm thinking is, it would be good to be able to filter out all of the events that are destined for the internal network as they are not of interest.&lt;/P&gt;

&lt;P&gt;The internal network is 192.168.x.x so I'd be looking to filter out all of those and let the rest get indexed. That would mean filtering out EventCode=4624 with field Destination Address=192.168*.&lt;/P&gt;

&lt;P&gt;Looking around this will probably be a props and transforms with regex or potentially a fancy blacklist. Hope you can advise.&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2015 12:54:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157935#M44486</guid>
      <dc:creator>pdjhh</dc:creator>
      <dc:date>2015-08-10T12:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157936#M44487</link>
      <description>&lt;P&gt;I'd say you need a black- and then a whitelist, so something like this in transforms.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[throwout]
REGEX = (?m)^EventCode=(5156)
DEST_KEY = queue
FORMAT = nullQueue

[keepsome]
REGEX = Destination\sAddress\:\s192\.168\.
DEST_KEY = queue
FORMAT = indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and this in props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]
TRANSFORMS-set= throwout,keepsome
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;HR /&gt;

&lt;P&gt;PS: I just realized that the above does the opposite of what you intended to do - it throws out all allowed firewall events, and it keeps specifically those destined for your local network. I must've misread your question halfway through, sorry.&lt;BR /&gt;
One possibility to achieve your goal is this, where we assume there are no other occurences of "Destination Adress = some ip" in any of the windows events (which I'm not really sure about, but preliminary googling revealed these to be most common in events 5156 and 5152). Props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]
TRANSFORMS-set= throwoutlocal
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and transforms.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[throwoutlocal]
REGEX = Destination\sAddress\:\s192\.168\.
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;A more reliable solution would be to use the cool method runals provided in the other answer - you won't miss any events at all, and you'll still cut down on the license and storage capacity for those prattling windows event logs.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2015 13:30:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157936#M44487</guid>
      <dc:creator>jeffland</dc:creator>
      <dc:date>2015-08-10T13:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157937#M44488</link>
      <description>&lt;P&gt;You could also look at re-writing the events to make them smaller = less license: &lt;A href="http://runals.blogspot.com/2014/07/taming-verbose-windows-logs-in-splunk.html"&gt;http://runals.blogspot.com/2014/07/taming-verbose-windows-logs-in-splunk.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2015 14:50:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157937#M44488</guid>
      <dc:creator>Runals</dc:creator>
      <dc:date>2015-08-10T14:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157938#M44489</link>
      <description>&lt;P&gt;Thanks for getting back to me. I'm very new to regex but that looks like you're keeping the events with 192.168. in them? I need to drop those ones and keep the rest. What do you think?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 06:55:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157938#M44489</guid>
      <dc:creator>pdjhh</dc:creator>
      <dc:date>2015-08-11T06:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157939#M44490</link>
      <description>&lt;P&gt;I have already added something to the answer in the meantime, does that help you out?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 07:09:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157939#M44490</guid>
      <dc:creator>jeffland</dc:creator>
      <dc:date>2015-08-11T07:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157940#M44491</link>
      <description>&lt;P&gt;I've just thrown it in, will need to let it run for a while so thanks, will write back.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 07:32:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157940#M44491</guid>
      <dc:creator>pdjhh</dc:creator>
      <dc:date>2015-08-11T07:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157941#M44492</link>
      <description>&lt;P&gt;Mmm, I'm still getting the events with destination_address=192.168.x.x&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 07:40:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157941#M44492</guid>
      <dc:creator>pdjhh</dc:creator>
      <dc:date>2015-08-11T07:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157942#M44493</link>
      <description>&lt;P&gt;Check your raw windows event logs. I based the above regex on a sample event I found for that event code, maybe yours looks differently? Please post a raw event.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 07:44:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157942#M44493</guid>
      <dc:creator>jeffland</dc:creator>
      <dc:date>2015-08-11T07:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157943#M44494</link>
      <description>&lt;P&gt;08/11/2015 05:48:23 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=5156&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=vm50_Template&lt;BR /&gt;
TaskCategory=Filtering Platform Connection&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=29313482&lt;BR /&gt;
Keywords=Audit Success&lt;BR /&gt;
Message=The Windows Filtering Platform has permitted a connection.&lt;/P&gt;

&lt;P&gt;Application Information:&lt;BR /&gt;
    Process ID:     1628&lt;BR /&gt;
    Application Name:   \device\harddiskvolume2\program files\vmware\vmware view\agent\bin\wsnm_jms.exe&lt;/P&gt;

&lt;P&gt;Network Information:&lt;BR /&gt;
    Direction:      Outbound&lt;BR /&gt;
    Source Address:     192.168.10.200&lt;BR /&gt;
    Source Port:        49159&lt;BR /&gt;
    Destination Address:    192.168.6.21&lt;BR /&gt;
    Destination Port:       4001&lt;BR /&gt;
    Protocol:       6&lt;/P&gt;

&lt;P&gt;Filter Information:&lt;BR /&gt;
    Filter Run-Time ID: 76977&lt;BR /&gt;
    Layer Name:     Connect&lt;BR /&gt;
    Layer Run-Time ID:  48&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 07:52:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157943#M44494</guid>
      <dc:creator>pdjhh</dc:creator>
      <dc:date>2015-08-11T07:52:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157944#M44495</link>
      <description>&lt;P&gt;The regex should work then. Strange.&lt;BR /&gt;
You did restart the forwarder I assume? Can you confirm the settings with btool?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 07:58:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157944#M44495</guid>
      <dc:creator>jeffland</dc:creator>
      <dc:date>2015-08-11T07:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157945#M44496</link>
      <description>&lt;P&gt;IT could be working now I'm not sure as I'm not getting any hits. The connections to non 192 addresses are few and far between so I'll leave it run for a while. If I see any events destined for non 192 addresses then we must be there..&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 08:39:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157945#M44496</guid>
      <dc:creator>pdjhh</dc:creator>
      <dc:date>2015-08-11T08:39:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157946#M44497</link>
      <description>&lt;P&gt;I'm seeing a huge number less events but still ones with 192 destination addresses. Problem with that is I don't really know what's working and what isn't. Will need to look deeper. Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 08:58:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157946#M44497</guid>
      <dc:creator>pdjhh</dc:creator>
      <dc:date>2015-08-11T08:58:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157947#M44498</link>
      <description>&lt;P&gt;I had the .conf files in the wrong location on the forwarder! Moved them to etc/system/local and started to take effect. Based on that I moved onto the solution mentioned by runals below which also worked after some addtional field extractions I had to do on the newly trimmed events.&lt;/P&gt;

&lt;P&gt;Thanks guys.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 12:41:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157947#M44498</guid>
      <dc:creator>pdjhh</dc:creator>
      <dc:date>2015-08-11T12:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure props.conf and transforms.conf to filter out a Windows eventcode?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157948#M44499</link>
      <description>&lt;P&gt;Hi there. This did indeed work for me and I got my events down from 766 to about 170. Looking forward to seeing the license usage tomorrow. I had to do some new field extractions but the trimmed events were neat and tidy so easy to do. Thanks a lot.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 12:42:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-configure-props-conf-and-transforms-conf-to-filter-out-a/m-p/157948#M44499</guid>
      <dc:creator>pdjhh</dc:creator>
      <dc:date>2015-08-11T12:42:31Z</dc:date>
    </item>
  </channel>
</rss>

