Splunk Cloud Platform

How to manage UF blacklist and whitelist with DS?

SplunkExplorer
Contributor

Hi Splunkers (I know, you starts to see my post too much on this blog...sorry!), I'm a bit confused about the management of blacklist and whitelist mechanism, for universal forwarders.

As I wrote on others posts, we are managing a Splunk Cloud for a customer where we are completing, for Windows logs, the migration from WMI to UF. After installation completed, we want to manage those UF with a DS. Reading docs, I got that first step to say a Splunk host "Hey, you are a DS!" is to create the first app to be deployed on clients.
Here the example states about outputs.conf but, due we already linked UFs to our HF, we don't need that; we prefer to use the inputs.conf, cause we want manage blacklist and whitelist mechanism true DS.

The confusing thing for me is: is I want to say to UF "Hey, collect only a subset of Windows Event Code ", I saw here on community some posts where people get struck with whitelist and its wa suggested to them to us bot parameters: whitelist and blacklist. What I don't understand is why this and, so, the final configuration.

For Example, if I want to say on inputs.conf for Security logs "Hey, collect only 4624 and 4625" I will have something like that:

[WinEventLog://Security]
...
<other parameter>

...

whitelist = ?
blacklist=?

Labels (2)
Tags (1)
0 Karma
1 Solution

dhruv
Explorer

Hey @SplunkExplorer ,

 

Yes. So if you want to collect only 4624 and 4625 event codes, Your inputs.conf will look like this : 

[WinEventLog://Security]

...
<other parameter>

...

whitelist = 4624/4625

 

This will ensure only these two eventcodes are ingested and nothing else.

Here is a doc to understand it better - https://docs.splunk.com/Documentation/Splunk/9.0.2/Admin/Inputsconf#Event_Log_filtering

https://docs.splunk.com/Documentation/Splunk/9.0.2/Admin/Inputsconf#Event_Log_allow_list_and_deny_li...

 

View solution in original post

dhruv
Explorer

Hey @SplunkExplorer ,

 

Yes. So if you want to collect only 4624 and 4625 event codes, Your inputs.conf will look like this : 

[WinEventLog://Security]

...
<other parameter>

...

whitelist = 4624/4625

 

This will ensure only these two eventcodes are ingested and nothing else.

Here is a doc to understand it better - https://docs.splunk.com/Documentation/Splunk/9.0.2/Admin/Inputsconf#Event_Log_filtering

https://docs.splunk.com/Documentation/Splunk/9.0.2/Admin/Inputsconf#Event_Log_allow_list_and_deny_li...

 

dhruv
Explorer

Hey @SplunkExplorer ,

Small correction. The eventcodes need to be comma separated. Thank you for accepting the answer.

[WinEventLog://Security]

...
<other parameter>

...

whitelist = 4624,4625

0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...