Getting Data In

How can I filter windows XML event logs?

nembela
Path Finder

I have the following inputs.conf stanza:

[WinEventLog://Security]
disabled = 0
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 0
checkpointInterval = 5
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"
blacklist2 = EventCode="^(4624|4634)$"
index = wineventlog
renderXml=true

It works fine and filters out eventcodes 4624 and 4634, but I'd like to filter these events only when LogonType equals 3. Since there is no Message field in XML event logs, I don't know how add this condition to blacklist2.
Any idea?

Thanks in advance

0 Karma
1 Solution

nembela
Path Finder

It turned out that this can't be done. When you filter Windows XML event logs through inputs.conf not all fields can be used that are listed in the documentation: http://docs.splunk.com/Documentation/Splunk/6.6.2/Admin/Inputsconf#Event_Log_whitelist_and_blacklist...
(for example "Message" field is not available as a key but "EvenctCode" is)
In this case the only solution is nullqueue filtering.

View solution in original post

0 Karma

nembela
Path Finder

It turned out that this can't be done. When you filter Windows XML event logs through inputs.conf not all fields can be used that are listed in the documentation: http://docs.splunk.com/Documentation/Splunk/6.6.2/Admin/Inputsconf#Event_Log_whitelist_and_blacklist...
(for example "Message" field is not available as a key but "EvenctCode" is)
In this case the only solution is nullqueue filtering.

0 Karma
Get Updates on the Splunk Community!

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...