All Apps and Add-ons

Blacklist event id from splunk server itself

rriis
Observer

I figured out how to add blacklisting in for forwarders (deployed apps), but where is this configured on the splunk server itself?  This is version 7.2.9.1.  The splunk server is windows.  I though it could be d:\program files\splunk\etc\system\local\inputs.conf, but that file looks very different than the one that is deployed to forwarders.

Labels (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Which form of blacklisting do you want?  Blacklisting of files is configured in inputs.conf on the forwarder whereas blacklisting of events is configured in props.conf and transforms.conf on the indexers.

Inputs.conf on the server is expected to be very different from the one on the forwarder.

---
If this reply helps you, Karma would be appreciated.
0 Karma

rriis
Observer

Thanks for the reply, I would like to blacklist a security event that is coming from the splunk server (itself).  The main splunk database server is logging a particular event id that is useless and filling up an index.  I would like to blacklist that event.  I know the syntax for blacklisting, just not sure how (or where) to configure this for the splunk main server.  thanks in advance

0 Karma

richgalloway
SplunkTrust
SplunkTrust

That would done on the indexers using props and transforms.

Have you looked at the cause(s) of those events?  Perhaps a simple change can prevent them from being generated in the first place.  What is the event?

---
If this reply helps you, Karma would be appreciated.
0 Karma

rriis
Observer

event 4663, removable storage.  The process information shows the process name to be d:\program files\splunk\bin\splunkd.exe

Seems like anytime splunk fires off that process it logs a 4663 event.  The D drive is not a removable media device but is just a second disk in the system (vmdk)

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Ah, a Windows event.  I thought you were dealing with an event generated by Splunk itself.  In this case, you can filter out that event in inputs.conf.  See "Event Log Filtering" in the Admin manual (https://docs.splunk.com/Documentation/Splunk/8.2.0/Admin/Inputsconf#Event_Log_filtering).

---
If this reply helps you, Karma would be appreciated.
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...