<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: I need to filter out logs that have &amp;quot;Account Name:		SERVER01$&amp;quot; in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308666#M4091</link>
    <description>&lt;P&gt;I need to prevent them from being indexed.&lt;/P&gt;</description>
    <pubDate>Sat, 18 Feb 2017 23:45:23 GMT</pubDate>
    <dc:creator>Nsdjanin</dc:creator>
    <dc:date>2017-02-18T23:45:23Z</dc:date>
    <item>
      <title>I need to filter out logs that have "Account Name:		SERVER01$"</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308662#M4087</link>
      <description>&lt;P&gt;Hello everybody,&lt;/P&gt;

&lt;P&gt;I'm new in this field and I have one question.&lt;BR /&gt;
We have too many windows security logs indexed that are generated by machine accounts.&lt;BR /&gt;
I want to filter out logs that looks like this:&lt;/P&gt;

&lt;P&gt;LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4658&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=comp1.domain.com&lt;BR /&gt;
TaskCategory=Removable Storage&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=4463688&lt;BR /&gt;
Keywords=Audit Success&lt;BR /&gt;
Message=The handle to an object was closed.&lt;/P&gt;

&lt;P&gt;Subject :&lt;BR /&gt;
    Security ID:        DOMAIN1\SERVER01$&lt;BR /&gt;
    Account Name:       SERVER01$&lt;BR /&gt;
    Account Domain:     DOMAIN1&lt;BR /&gt;
    Logon ID:       0x347732&lt;/P&gt;

&lt;P&gt;I need to filter out logs that have "Account Name:      SERVER01$".&lt;BR /&gt;
What is the best way to do this?&lt;BR /&gt;
I know about props.conf and transforms.conf, but I don't know how to generate right regex for that.&lt;/P&gt;

&lt;P&gt;Please help!&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2017 15:20:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308662#M4087</guid>
      <dc:creator>Nsdjanin</dc:creator>
      <dc:date>2017-02-18T15:20:24Z</dc:date>
    </item>
    <item>
      <title>Re: I need to filter out logs that have "Account Name:		SERVER01$"</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308663#M4088</link>
      <description>&lt;P&gt;You need to blacklist your &lt;STRONG&gt;[WinEventLog://Security]&lt;/STRONG&gt; input in inputs.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist= EventCode="4658"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Refer to the documentation for using Whitelist and Blacklist in input.conf&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWindowseventlogdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWindowseventlogdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Also for specs and conf of inputs.conf please refer &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2017 17:46:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308663#M4088</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2017-02-18T17:46:37Z</dc:date>
    </item>
    <item>
      <title>Re: I need to filter out logs that have "Account Name:		SERVER01$"</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308664#M4089</link>
      <description>&lt;P&gt;niketnilay thanks on answer but i need eventcode 4658.&lt;BR /&gt;
I want to filter out only machine account Account Name: SERVER01$ that generates these logs. Other accounts I need.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2017 18:22:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308664#M4089</guid>
      <dc:creator>Nsdjanin</dc:creator>
      <dc:date>2017-02-18T18:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: I need to filter out logs that have "Account Name:		SERVER01$"</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308665#M4090</link>
      <description>&lt;P&gt;Do you need to prevent them from being indexed or do you need them to be dropped from a specific search's results set?&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2017 23:12:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308665#M4090</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-02-18T23:12:46Z</dc:date>
    </item>
    <item>
      <title>Re: I need to filter out logs that have "Account Name:		SERVER01$"</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308666#M4091</link>
      <description>&lt;P&gt;I need to prevent them from being indexed.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2017 23:45:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308666#M4091</guid>
      <dc:creator>Nsdjanin</dc:creator>
      <dc:date>2017-02-18T23:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: I need to filter out logs that have "Account Name:		SERVER01$"</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308667#M4092</link>
      <description>&lt;P&gt;Assuming that the &lt;CODE&gt;sourcetype&lt;/CODE&gt; is &lt;CODE&gt;WinEventLog:Security&lt;/CODE&gt;:&lt;/P&gt;

&lt;P&gt;In props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::WinEventLog:Security]
TRANSFORMS-eliminate-4658-SERVER01 = eliminate-4658-SERVER01
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In transforms.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[eliminate-4658-SERVER01]
REGEX = (?ms)[\s\r\n]+EventCode\s*=\s*4658[\s\r\n]+.*[\s\r\n]+Account\s+Name:\s*SERVER01\$[\s\r\n]+
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You will need to restart &lt;CODE&gt;splunkd&lt;/CODE&gt; on EVERY indexer and even then, only post-restart events will be dropped (what is in is in).&lt;/P&gt;</description>
      <pubDate>Sun, 19 Feb 2017 01:31:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308667#M4092</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-02-19T01:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: I need to filter out logs that have "Account Name:		SERVER01$"</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308668#M4093</link>
      <description>&lt;P&gt;See my answer.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Feb 2017 01:32:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308668#M4093</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-02-19T01:32:00Z</dc:date>
    </item>
    <item>
      <title>Re: I need to filter out logs that have "Account Name:		SERVER01$"</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308669#M4094</link>
      <description>&lt;P&gt;Woodcock thanks, but after your proposed changes I now have a situation that all of mine security logs from this particular machine is filtered out. Not only 4658 with account name SERVER01$ but all.&lt;BR /&gt;
Do you have any idea?&lt;/P&gt;</description>
      <pubDate>Sun, 19 Feb 2017 08:48:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308669#M4094</guid>
      <dc:creator>Nsdjanin</dc:creator>
      <dc:date>2017-02-19T08:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: I need to filter out logs that have "Account Name:		SERVER01$"</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308670#M4095</link>
      <description>&lt;P&gt;First, I forgot 1 key configuration: &lt;CODE&gt;FORMAT = nullQueue&lt;/CODE&gt; (I updated the answer).  But that mistake should not have caused what you are describing.  Fix that mistake and if it doesn't behave, then perhaps there is something else that you added that is doing this (e.g. &lt;CODE&gt;blacklist&lt;/CODE&gt;).&lt;/P&gt;</description>
      <pubDate>Sun, 19 Feb 2017 14:52:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308670#M4095</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-02-19T14:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: I need to filter out logs that have "Account Name:		SERVER01$"</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308671#M4096</link>
      <description>&lt;P&gt;Props.conf&lt;BR /&gt;
[source::WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-filterWinSecNull = filterWinSecNull&lt;/P&gt;

&lt;P&gt;Transforms.conf&lt;BR /&gt;
[filterWinSecNull]&lt;BR /&gt;
REGEX = (?ms)[\s\r\n]+EventCode\s*=\s*4658[\s\r\n]+.*[\s\r\n]+Account\s+Name:\s*SERVER01\$[\s\r\n]+&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;These are my props.conf and transforms.conf files.&lt;BR /&gt;
I don't have any blacklists.&lt;BR /&gt;
This configuration filters out all windows security logs from that particular machine that has lots of logs with Account name SERVER01$.&lt;/P&gt;

&lt;P&gt;Do you have any ideas?&lt;BR /&gt;
.&lt;BR /&gt;
Thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 12:55:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308671#M4096</guid>
      <dc:creator>Nsdjanin</dc:creator>
      <dc:date>2020-09-29T12:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: I need to filter out logs that have "Account Name:		SERVER01$"</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308672#M4097</link>
      <description>&lt;P&gt;It looks fine to me and it should work as you listed it.  I am at a loss.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Feb 2017 21:26:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/308672#M4097</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-02-19T21:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: I need to filter out logs that have "Account Name:		SERVER01$"</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/567752#M4098</link>
      <description>&lt;P&gt;Maybe you want to use this -&lt;/P&gt;&lt;P&gt;| regex Account_Name!="\$$"&lt;BR /&gt;&lt;BR /&gt;I am using this in my search string and it drop all the hostname$&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Sep 2021 21:45:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/I-need-to-filter-out-logs-that-have-quot-Account-Name-SERVER01/m-p/567752#M4098</guid>
      <dc:creator>splunknewbie81</dc:creator>
      <dc:date>2021-09-20T21:45:36Z</dc:date>
    </item>
  </channel>
</rss>

