Getting Data In

How to filter WMI event logs using blacklist, props or transforms in Splunk 6.* ?

dbabanov
Path Finder

Hello, everybody!

I have some question.
We collect WMI event log security. So sourcetype in splunk is "wmi:eventlog:security".
How I can filter events by EventCode=5145.

How I can use "blacklist" in inputs.conf? Or I must use props.conf and transform.conf? What stanza should I create them?

P.S. I have splunk 6.1.1.

Tanks.

0 Karma
1 Solution

rdjoraev_splunk
Splunk Employee
Splunk Employee

In Splunk 6.2.3 release stanza should be [WinEventLog:Security] instead of [WMI:WinEventLog:Security]

For more for more details about the stanza settings in inputs.conf, please refer to Splunk Documentation:
http://docs.splunk.com/Documentation/Splunk/6.2.3/Data/MonitorWindowsdata

View solution in original post

0 Karma

rdjoraev_splunk
Splunk Employee
Splunk Employee

In Splunk 6.2.3 release stanza should be [WinEventLog:Security] instead of [WMI:WinEventLog:Security]

For more for more details about the stanza settings in inputs.conf, please refer to Splunk Documentation:
http://docs.splunk.com/Documentation/Splunk/6.2.3/Data/MonitorWindowsdata

0 Karma

Oakley
Explorer

Put this under the secuity log WMI stanza in inputs.conf:

blacklist = 5145

Should do the trick.

0 Karma

dbabanov
Path Finder

I do this, but i have error, that unknown parametr in stanza WMI.
Any idea, how i should filter events using props and transforms conf-files?

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...