Splunk Search

Filtering events and Windows Platform Filtering events

ejdavis
Path Finder

When adding a new filter to props.conf and transforms.conf does it remove events that have already been indexed or only new incoming events?

We are attempting to filter out all "Windows Platform Filtering" events. Is there a regex to do this, or will we need to have a regex for each Event Code?

From a previous question I was given:

(?msi)^EventCode=5156D

If I search "EventCode=5156" there's plenty of results.

I am attempting to search via:

| regex _raw=(?msi)^EventCode=5156D

I am unable to find anything

0 Karma

sowings
Splunk Employee
Splunk Employee

Splunk's latest release, version 6, builds event ID filtering into the WinEventLog inputs. See inputs.conf documentation for more details.

0 Karma

gregbujak
Path Finder

It will never remove anything from the index. You have to use the cli clear command. Technically, even "| delete" doesnt remove it from the index (masks it).

To filter out multiple events, see this post:
http://answers.splunk.com/answers/59370/filtering-events-using-nullqueue

0 Karma

lukejadamec
Super Champion
| regex _raw=(?msi)^EventCode=5156\D

I think it was missing a \ before the D.
You can also run this without the \D

| regex _raw=(?msi)^EventCode=5156
0 Karma

lukejadamec
Super Champion

Well that does look easy.
If you are running Splunk6
Try adding
blacklist = 5156
to your inputs.conf stanza for the wmi:wineventlog:security source. And thank sowings.

0 Karma

sowings
Splunk Employee
Splunk Employee

[WinEventLog] inputs, whitelist / blacklist.

lukejadamec
Super Champion

I just tested
| regex _raw=(?msi)^EventCode=5156
and it worked. You can also use
| regex EventCode=5156
I looked at the most recent inputs.conf information, but I did not see what sowings was refering to. I'm sure it is there, but will take some reading.

0 Karma

ejdavis
Path Finder

I'm still unable to find any results via search with either of those regex expressions

But I am able to see thousands of events when I search, "EventCode=5156"

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...

Keep the Learning Going with the New Best of .conf Hub

Hello Splunkers, With .conf26 getting closer, there’s already a lot of excitement building around this year’s ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...