I am trying to nail exactly what I need for this. There is so many different explanations, that I find I am more confused than when I started looking into it.
I am using a universal forwarder version 188.8.131.52789 on a Windows 2012 server. This is a DC.
Basically I only want to send event codes that are 4624 or 4634. I do not care about anything else at this stage.
I have changed the %splunk_home%\etc\system\local inputs.conf file to look like below:
host = YYY
disabled = 0
disabled = 0
current_only = 0
evt_resolve_ad_obj = 1
checkpointInterval = 5
whitelist = 4624,4634
When I restarted the forwarder if just sent everything as normal. By normal I mean we chose security log tick box when we installed the Universal Forwarder in the first place.
By the way in the preview, it has removed the underscores from current only and evt resolve ad obj
This is the first time I have tried this. Any help much appreciated.
Found it, there is a typo in the input name. So the default from another app must be applied instead.
To verify the result, run a btool
splunk cmd btool inputs list --debug
To follow on aweitzman's suggestion to throw out the events you don't want, the following in an example of sending select event log items to the null queue with props.conf and transforms.conf(you will need to adjust your regex to the events you want to keep/drop):
You need to use a heavy forwarder if you want to filter the information before sending it. The universal forwarder only adds some metadata and forwards - it can't be used to do any filtering at the source:
Alternatively, you can configure the indexer to throw out the data you don't want from this source.
The nullQueue filtering (at the indexer/heavy forwarder level) was the old way.
Since splunk 6.* you can use the whitelist/blacklist for EventCode at the input level on any forwarders.
I am surprised that the config above didn't work.