Getting Data In

How to filter WMI event logs using blacklist, props or transforms in Splunk 6.* ?

dbabanov
Path Finder

Hello, everybody!

I have some question.
We collect WMI event log security. So sourcetype in splunk is "wmi:eventlog:security".
How I can filter events by EventCode=5145.

How I can use "blacklist" in inputs.conf? Or I must use props.conf and transform.conf? What stanza should I create them?

P.S. I have splunk 6.1.1.

Tanks.

0 Karma
1 Solution

rdjoraev_splunk
Splunk Employee
Splunk Employee

In Splunk 6.2.3 release stanza should be [WinEventLog:Security] instead of [WMI:WinEventLog:Security]

For more for more details about the stanza settings in inputs.conf, please refer to Splunk Documentation:
http://docs.splunk.com/Documentation/Splunk/6.2.3/Data/MonitorWindowsdata

View solution in original post

0 Karma

rdjoraev_splunk
Splunk Employee
Splunk Employee

In Splunk 6.2.3 release stanza should be [WinEventLog:Security] instead of [WMI:WinEventLog:Security]

For more for more details about the stanza settings in inputs.conf, please refer to Splunk Documentation:
http://docs.splunk.com/Documentation/Splunk/6.2.3/Data/MonitorWindowsdata

0 Karma

Oakley
Explorer

Put this under the secuity log WMI stanza in inputs.conf:

blacklist = 5145

Should do the trick.

0 Karma

dbabanov
Path Finder

I do this, but i have error, that unknown parametr in stanza WMI.
Any idea, how i should filter events using props and transforms conf-files?

0 Karma
Get Updates on the Splunk Community!

There's No Place Like Chrome and the Splunk Platform

Watch On DemandMalware. Risky Extensions. Data Exfiltration. End-users are increasingly reliant on browsers to ...

The Great Resilience Quest: 5th Leaderboard Update

The fifth leaderboard update for The Great Resilience Quest is out >> 🏆 Check out the ...

Devesh Logendran, Splunk, and the Singapore Cyber Conquest

At this year’s Splunk University, I had the privilege of chatting with Devesh Logendran, one of the winners in ...