Getting Data In

Filter WinEventLog

mildorp
New Member

Hi, i need of the filter for Windows Logs, in Splunk Web, ok....more i need in inputs in each machine.
TaskCategory="Logon" OR "logoff" Logon_Type="2" OR Logon_Type="3" OR Logon_Type="10" OR Logon_Type="11"

thanks..

Tags (1)
0 Karma

yannK
Splunk Employee
Splunk Employee

The props/transforms only apply when the events are parsed, so only on the indexers (or heavy forwarders)
It will not work in the universal or lightweight forwarders.

0 Karma

mildorp
New Member

Thanks...
I need to use this filter in transforms.conf and propos.conf the file, however it's not working.

0 Karma

Jon_Webster
Splunk Employee
Splunk Employee

I'm not sure what you're asking for. I tried the search below on our system and it works fine:

index="main" (TaskCategory="Logon" OR TaskCategory="logoff") (Logon_Type="2" OR Logon_Type="3" OR Logon_Type="10" OR Logon_Type="11")

Are you getting the events you want?

Note that your search: TaskCategory="Logon" OR "logoff" will get any events that contain the work "logoff", even if they are not in the TaskCategory field.

You might want to use (TaskCategory="Logon" OR TaskCategory="logoff")

0 Karma

mildorp
New Member

Thanks...
I need to use this filter in transforms.conf and propos.conf the file, however it's not working.

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...