I have the following inputs.conf stanza:
[WinEventLog://Security]
disabled = 0
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 0
checkpointInterval = 5
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"
blacklist2 = EventCode="^(4624|4634)$"
index = wineventlog
renderXml=true
It works fine and filters out eventcodes 4624 and 4634, but I'd like to filter these events only when LogonType equals 3. Since there is no Message field in XML event logs, I don't know how add this condition to blacklist2.
Any idea?
Thanks in advance
It turned out that this can't be done. When you filter Windows XML event logs through inputs.conf not all fields can be used that are listed in the documentation: http://docs.splunk.com/Documentation/Splunk/6.6.2/Admin/Inputsconf#Event_Log_whitelist_and_blacklist...
(for example "Message" field is not available as a key but "EvenctCode" is)
In this case the only solution is nullqueue filtering.
It turned out that this can't be done. When you filter Windows XML event logs through inputs.conf not all fields can be used that are listed in the documentation: http://docs.splunk.com/Documentation/Splunk/6.6.2/Admin/Inputsconf#Event_Log_whitelist_and_blacklist...
(for example "Message" field is not available as a key but "EvenctCode" is)
In this case the only solution is nullqueue filtering.