Getting Data In

WinEventLog filtering on indexer

CerielTjuh
Path Finder

Hello there,

I have currently deployed Splunk in our network using SplunkLightForwarders and one central indexing server. I am indexing Windows Event Logs and forwarding them to the central indexer.

I am trying to create a filter to filter and send only the eventcode wich we want to see. I know a LightForwarder doesn't have the ability to filter the data so the action needs to be done on the central indexer.

I have created a props.conf and transforms.conf but it doesn't seem to work and i am confused why it doens't work.

props.conf

[WinEventLog:Security]
TRANSFORMS-queue=InputAllowed,InputNull

transforms.conf

[InputAllowed]
REGEX=^EventCode=(4634|4662)
DEST_KEY=queue
FORMAT=indexQueue

[InputNull]
REGEX=(.)
DEST_KEY=queue
FORMAT=nullQueue

If I replace the configuration so that the EventCodes 4634 and 4662 are droppen to the nullQueue it works, only the filtering so that everything else is dropped doens't work . . .

BP9906
Builder

your props.conf looks wrong.

[source::WinEventLog:Security]
TRANSFORMS-nullQ=nullFilter-WFP5156

transform.conf for my props.conf entry:

[nullFilter-WFP5156]
REGEX = EventCode=5156
DEST_KEY = queue
FORMAT = nullQueue
0 Karma

Lowell
Super Champion

CerielTjuh, please update your question. If you have found a solution, please indicate so by checking one of them.

0 Karma

CerielTjuh
Path Finder

Any new thoughts on this issue?

-props.conf-
[source::WinEventLog:Security]
TRANSFORMS-set= setparsing, setnull

Part two.

-transforms.conf-
[setparsing]
REGEX = (?m)^EventCode=(592|593)
DEST_KEY = queue
FORMAT = tcpOutQueue

[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

The funny side is that Splunk does not forward anything when i activate this script. Only the Application and System logs are forwarding. I also tried to publish this application as a deployment app, but that doesn't work either...

I could really use some help 😉

0 Karma

gfriedmann
Communicator

gkanapathy: according to documentation, nullQueue transforms are processed last, so the order shouldn't matter in this case.
http://www.splunk.com/base/Documentation/latest/Admin/Routeandfilterdata

0 Karma

CerielTjuh
Path Finder

I will change the order and try again, I tried it on a light forwarder (but that doesn't work by design) and now on a forwarder (basic install with a deployment app to forward the data)

0 Karma

gkanapathy
Splunk Employee
Splunk Employee

you should reverse the order. if you set the queue to tcpOutQueue (which I don't believe is correct anyway), the next rule sets it to null, so it will be discarded. It's also important to specify whether this is on an indexer or light forwarder or regular forwarder.

0 Karma

BunnyHop
Contributor

Please see this:

http://answers.splunk.com/questions/577/how-do-you-filter-windows-event-log

This talks about filtering the native Windows Event Log. Since the eventlog is a multiline type event log, you will have to add the (?m) before your query. Also, if you're using LWF, you would want to have the props.conf and transforms.conf configured on the indexer. I would do a negate regex, so that way everything is not indexed but eventCodes 4634 and 4662. By doing this, you can remove the InputNull reference on your props, and completely remove it from your transform. Change your transform to this:

transforms.conf

[WinEventLog:Security]
TRANSFORMS-InputNegate = InputNegate

transforms.conf

[InputNegate]
REGEX = (?msi).*EventCode=([^4634]|[^4662]).*
DEST_KEY = queue
FORMAT = nullQueue

CerielTjuh
Path Finder

Yes, and im trying to create a whitelist, that is what i want in the end, but the problem is that it doesn't work, if I change the FORMAT = nullQueue to indexQueue the events aren't showing up. Or do I need to make a different whitelist?

0 Karma

BunnyHop
Contributor

Understood. The problem really is either you're blacklisting or whitelisting. You can either allow for certain events and then drop everything else or you can drop certain events and allow everything else. Does this make sense?

0 Karma

CerielTjuh
Path Finder

The problem is that my license doesn't allow it 😉

0 Karma

BunnyHop
Contributor

It should be possible. What are you trying to accomplish? If you want to keep the rest of the events on Splunk you're probably better off creating a saved search instead of filtering.

0 Karma

CerielTjuh
Path Finder

I'm sorry but it still isn't working Bunny, EventCode 4769 is also in my results... Not sure if I gave you a good idea of what i want to do, i want to create a filter of the events i want to see, not remove the things i don't want to see. During the weekend i tried multiple things on my environment and also on a fresh installed environment without results. Is it even possible ?

0 Karma

BunnyHop
Contributor

Then in that case, I've updated my original answer.

0 Karma

CerielTjuh
Path Finder

True, changed it but still not receiving anything.
The funny fact is if i change the InputNull to remove the eventcodes 4634 and leave the other one unchanged it works (so he removes the events with eventcode 4634 and forwards the others) but i want to be able to keep the events that i want to see and remove all the others

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...