Getting Data In

What is the proper syntax to whitelist a single EventCode from wineventlog security with a UF ?

Glasses
Builder

Hi - 

Not having any luck testing or finding the answer in documentation so hopefully someone can confirm.

 

I want to collect a single EventCode=4624 from a Windows Server with a UF (v 8.0.6).

I am using an inputs.conf stanza like this>>>

#2021.4.19
[WinEventLog://Security]
disabled = 0
index=foo
whitelist1 = EventCode=4624

I am still collecting all wineventlog security EventCodes.

Any ideas?

TY!

0 Karma
1 Solution

Glasses
Builder

Actually the issue was something with the UF not restarting splunkd.   

 

This stanza does work now... 

[WinEventLog://Security]
disabled = 0
index=foo
whitelist = 4624

View solution in original post

0 Karma

Glasses
Builder

Even tried >>>

 

whitelist = 4624

 

no luck 😞

 

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Glasses,

whitelist and blacklist require regexes, so, please, try:

whitelist1 = EventCode\=4624

then, are your logs in json or normal format? if in json the regex is different.

Ciao.

Giuseppe

Glasses
Builder

Actually the issue was something with the UF not restarting splunkd.   

 

This stanza does work now... 

[WinEventLog://Security]
disabled = 0
index=foo
whitelist = 4624

0 Karma
Get Updates on the Splunk Community!

Index This | Divide 100 by half. What do you get?

November 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

❄️ Celebrate the season with our December lineup of Community Office Hours, Tech Talks, and Webinars! ...

Splunk and Fraud

Watch Now!Watch an insightful webinar where we delve into the innovative approaches to solving fraud using the ...