Getting Data In
Highlighted

How can I filter windows XML event logs?

Explorer

I have the following inputs.conf stanza:

[WinEventLog://Security]
disabled = 0
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 0
checkpointInterval = 5
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"
blacklist2 = EventCode="^(4624|4634)$"
index = wineventlog
renderXml=true

It works fine and filters out eventcodes 4624 and 4634, but I'd like to filter these events only when LogonType equals 3. Since there is no Message field in XML event logs, I don't know how add this condition to blacklist2.
Any idea?

Thanks in advance

0 Karma
Highlighted

Re: How can I filter windows XML event logs?

Explorer

It turned out that this can't be done. When you filter Windows XML event logs through inputs.conf not all fields can be used that are listed in the documentation: http://docs.splunk.com/Documentation/Splunk/6.6.2/Admin/Inputsconf#Event_Log_whitelist_and_blacklist...
(for example "Message" field is not available as a key but "EvenctCode" is)
In this case the only solution is nullqueue filtering.

View solution in original post

0 Karma