Getting Data In

Issue filtering events from windows secutiry log going into indexer

New Member

I am having difficulty filtering the Windows security logs. I have attempted to restrict the event IDs being sent but at the moment the entire security log is being indexed. Here is my currently deployed configuration. Any help would be greatly appreciated.


evt_resolve_ad_obj = 1

index = security



TRANSFORMS-set= setnull,setparsing,setparsing2


DEST_KEY = queue
FORMAT = nullQueue

DEST_KEY = queue
FORMAT = indexQueue

DEST_KEY = queue
FORMAT = indexQueue

Tags (2)
0 Karma

Splunk Employee
Splunk Employee

Any chance you are on splunk 6?

You can filter event codes at the forwarders now.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to July and August Tech Talks, Office Hours, and Webinars!

Dive into our sizzling summer lineup for July and August Community Office Hours and Tech Talks. Scroll down to ...

Edge Processor Scaling, Energy & Manufacturing Use Cases, and More New Articles on ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Get More Out of Your Security Practice With a SIEM

Get More Out of Your Security Practice With a SIEMWednesday, July 31, 2024  |  11AM PT / 2PM ETREGISTER ...