Getting Data In

Why is the Index Filter is not working?

ntripp_element
Explorer

I have a filter built from: http://docs.splunk.com/Documentation/Splunk/7.0.2/Forwarding/Routeandfilterdatad and https://www.splunk.com/blog/2012/09/21/the-splunk-app-for-active-directory-and-how-i-tamed-the-secur...

transforms.conf
[dumpFirewallEvents]
REGEX=(?m)EventCode=(5156|5157)
DEST_KEY = queue
FORMAT=nullQueue

props.conf
[source::wineventlog:security] TRANSFORMS-firewall = dumpFirewallEvents

I'm stilling seeing the events 5156 in splunk and it's flooding the index quota

0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi ntripp_element,
at a first sight, I see an error in your regex: = is a special char that you must escape with backslash "\"

REGEX=(?m)EventCode\=5156|5157

Anyway I usually prefer to use two transforms:
in props.conf

[WinEventLog:Security]
TRANSFORMS-set= setparsing,setnull

in transforms.conf

[setnull]
REGEX = (?m)EventCode\=(5156|5157)
DEST_KEY = queue
FORMAT = nullQueue
[setparsing]
REGEX = .
DEST_KEY = queue
FORMAT = indexQueue

Bye.
Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi ntripp_element,
at a first sight, I see an error in your regex: = is a special char that you must escape with backslash "\"

REGEX=(?m)EventCode\=5156|5157

Anyway I usually prefer to use two transforms:
in props.conf

[WinEventLog:Security]
TRANSFORMS-set= setparsing,setnull

in transforms.conf

[setnull]
REGEX = (?m)EventCode\=(5156|5157)
DEST_KEY = queue
FORMAT = nullQueue
[setparsing]
REGEX = .
DEST_KEY = queue
FORMAT = indexQueue

Bye.
Giuseppe

0 Karma

somesoni2
Revered Legend

If you're using Splunk 6 or above at your forwarder level, you can/should do filter of Windows Event logs at forwarder level using blacklist attribute in the monitoring stanza. See this

http://docs.splunk.com/Documentation/Splunk/7.0.2/Data/MonitorWindowseventlogdata#Create_advanced_fi...

0 Karma

ntripp_element
Explorer

I tried that too as below:

[default]
host =

[script://$SPLUNK_HOME\bin\scripts\splunk-wmi.path]
disabled = 0

[WinEventLog://Security]
disabled = 0
start_from = oldest
blacklist = 5156-5157

Also not working

0 Karma

somesoni2
Revered Legend

So you're adding above inputs.conf entry in the Windows server where you're collecting Windows Event logs from? Did you restart Splunk service after making the change?

0 Karma

ntripp_element
Explorer

I'm using the universal forwarder to the splunk indexer. I placed those settings into inputs.conf on the indexer and restarted the service.

0 Karma
Get Updates on the Splunk Community!

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

A Guide To Cloud Migration Success

As enterprises’ rapid expansion to the cloud continues, IT leaders are continuously looking for ways to focus ...