<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with SEDCMD raw event size reduction in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646923#M110010</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240690"&gt;@DanAlexander&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;could you use a test system with the same configurations?&lt;/P&gt;&lt;P&gt;I hinted this test because&amp;nbsp; all the times I had to work with regexes containing backslasher I found problems in Splunk, but the SEDCMD I share should be correct.&lt;/P&gt;&lt;P&gt;For this reason I'd like to understand if the problem is inside or outside the regex, to be focused on the issue.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Wed, 14 Jun 2023 07:18:40 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2023-06-14T07:18:40Z</dc:date>
    <item>
      <title>How to achieve SEDCMD raw event size reduction?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646794#M109981</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;
&lt;P&gt;I am having an issue creating appropriate SEDCMD to reduce the size of specific Win events.&lt;/P&gt;
&lt;P&gt;I am trying to extract only one random bit (could be anything) and through all the rest before they get indexed.&lt;/P&gt;
&lt;P&gt;Below is the raw Event and wanted to drop (it is large). I just want a single word/line. I did try the following but it did nothing. Under the Splunk_TA_Windows local/props I did put something like&amp;nbsp; [source::XmlWinEventLog:Security] SEDCMD-4688_splunkd_events_clearing=s/.\\Program Files\\.+\\splunkd\.exe//g&amp;nbsp;&lt;/P&gt;
&lt;P&gt;----------------------------------------------- Raw Event---------------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;lt;Event xmlns='&lt;A href="http://schemas.microsoft.com/win/2004/08/events/event" target="_blank" rel="noopener"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;'&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name='Microsoft-Windows-Security-Auditing' Guid=' XXXXXXXX -4994-a5ba-3e3b0328c30d}'/&amp;gt;&amp;lt;EventID&amp;gt;4688&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;13312&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime='2023-06-13T10:39:41.797279900Z'/&amp;gt;&amp;lt;EventRecordID&amp;gt;12536409&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Execution ProcessID='4' ThreadID='15216'/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt; XXXXXXXX &amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name='SubjectUserSid'&amp;gt;S-1-5-18&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectUserName'&amp;gt;XXXXXXXX&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectDomainName'&amp;gt; XXXXXXXX &amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectLogonId'&amp;gt;0 XXXXXXXX 7&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessId'&amp;gt;0x2734&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TokenElevationType'&amp;gt;%%1936&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessId'&amp;gt;0x17d4&amp;lt;/Data&amp;gt;&amp;lt;Data Name='CommandLine'&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserSid'&amp;gt;S-1-0-0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ParentProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='MandatoryLabel'&amp;gt;XXXXXXXX -16384&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;&lt;/P&gt;
&lt;P&gt;Caller_Domain = XXXXXXXX ller_User_Name = XXXXXXXX Channel = SecurityComputer = XXXXXXXX privEVentId = EventIDError_Code = -EventCode = 4688EventData_Xml = &amp;lt;Data Name='SubjectUserSid'&amp;gt; XXXXXXXX &amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectUserName'&amp;gt; XXXXXXXX&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectDomainName'&amp;gt; XXXXXXXX &amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectLogonId'&amp;gt;0x3e7&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessId'&amp;gt;0x2734&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TokenElevationType'&amp;gt;%%1936&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessId'&amp;gt;0x17d4&amp;lt;/Data&amp;gt;&amp;lt;Data Name='CommandLine'&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserSid'&amp;gt;S-1-0-0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ParentProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='MandatoryLabel'&amp;gt;S-1-16-16384&amp;lt;/Data&amp;gt;EventID = 4688EventRecordID = 12 XXXXXXXXid = '{54849625-XXXXXXXX-a5ba-3e3b0328c30d}'Keywords = 0x8020000000000000Level = 0Logon_ID = 0x3e7MandatoryLabel = S-1-16-16384Name = 'Microsoft-Windows-Security-Auditing'NewProcessId = 0x2XXXXXXXX4NewProcessName = C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exeOpcode = 0ParentProcessName = C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeProcessID = '4'ProcessId = 0x17d4RecordNumber = 12536409SubjectDomainName = XXXXXXXXbjectLogonId = 0x3e7SubjectUserName = XXXXXXXX= S-1-5-18SystemTime = XXXXXXXX:39:41.797279900Z'System_Props_Xml = &amp;lt;Provider Name='Microsoft-Windows-Security-Auditing' Guid='{XXXXXXXX4994-a5ba-3e3b0328c30d}'/&amp;gt;&amp;lt;EventID&amp;gt;4688&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;13312&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime='2023-06-13T10XXXXXXXX/&amp;gt;&amp;lt;EventRecordID&amp;gt;12536409&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Execution ProcessID='4' ThreadID='15216'/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;XXXXXXXX&amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;TargetDomainName = -TargetLogonId = 0x0TargetUserName = -TargetUserSid = S-1-0-0Target_Domain = -Target_User_Name = -Task = 13312ThreadID = '15216'TokenElevationType = %%1936Token_Elevation_Type = %%1936Token_Elevation_Type_id = 1936Version = 2action = allowedapp = win:unknowndest = XXXXXXXX= XXXXXXXXcaracal01.greenstream.privdvc_nt_host = XXXXXXXXevent_id = 12536409eventtype = endpoint_services_processes eventtype = windows_endpoint_processes process report eventtype = windows_event_signature track_event_signatures eventtype = windows_process_new execute process start eventtype = wineventlog_security os windows eventtype = wineventlog_windows os windows eventtype = winsec securityhost = XXXXXXXXid = 12536409index = XXXXXXXXserverlinecount = 1name = A new process has been creatednew_process = C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exenew_process_id = 0x2734new_process_name = splunk-MonitorNoHandle.exeparent_process = C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeparent_process_id = 0x17d4parent_process_name = splunkd.exeparent_process_path = C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeprocess = C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exeprocess_exec = splunk-MonitorNoHandle.exeprocess_id = 0XXXXXXXX4process_name = splunk-MonitorNoHandle.exeprocess_path = C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exeproduct = Windowspunct = &amp;lt;_='://../////'&amp;gt;&amp;lt;&amp;gt;&amp;lt;_='---'_='{----}'/&amp;gt;&amp;lt;&amp;gt;&amp;lt;/&amp;gt;&amp;lt;&amp;gt;&amp;lt;/&amp;gt;&amp;lt;&amp;gt;session_id = 0x3e7signature = A new process has been createdsignature_id = 4688source = XmlWinEventLog:Securitysourcetype = XmlWinEventLogsplunk_server = XXXXXXXX_nt_domain = XXXXXXXXsrc_user = XXXXXXXX$status = successsubject = A new process has been createdta_windows_action = failuretag = execute tag = os tag = process tag = report tag = security tag = start tag = track_event_signatures tag = windowsuser = XXXXXXXX$user_group = -vendor = Microsoftvendor_product = Microsoft Windows&lt;/P&gt;
&lt;P&gt;Any help is much appreciated. Thank you All!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 00:21:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646794#M109981</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-15T00:21:23Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646798#M109983</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240690"&gt;@DanAlexander&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you can use the TRUNCATE option in props.conf to define the max lenght of each event.&lt;/P&gt;&lt;P&gt;to use SEDCMD, you have to identify a regex with the contents to maintain.&lt;/P&gt;&lt;P&gt;Can you highlight in bold the events' partes to maintain?&lt;/P&gt;&lt;P&gt;did you defined a rule about the contents to maintain?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 11:44:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646798#M109983</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-06-13T11:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646800#M109984</link>
      <description>&lt;P&gt;Thanks for the reply&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to replace all of the content with the following:&amp;nbsp;&lt;SPAN&gt;ParentProcessName = C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Dan&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 11:50:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646800#M109984</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-13T11:50:45Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646803#M109985</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240690"&gt;@DanAlexander&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;please try this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;SEDCMD = s/.*/ParentProcessName \= C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd\.exe/g&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 11:53:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646803#M109985</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-06-13T11:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646809#M109986</link>
      <description>&lt;P&gt;I tried the following but still, events are intact:&lt;/P&gt;&lt;P&gt;[XmlWinEventLog]&lt;/P&gt;&lt;P&gt;SEDCMD = s/.*/ParentProcessName \= C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd\.exe/g&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 12:39:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646809#M109986</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-13T12:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646815#M109988</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240690"&gt;@DanAlexander&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;please try:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;SEDCMD = s/.*/ParentProcessName\s*\=\s*C:\\Program\sFiles\\SplunkUniversalForwarder\\bin\\splunkd\.exe/g&lt;/LI-CODE&gt;&lt;P&gt;it runs on regex101.com as you can see at &lt;A href="https://regex101.com/r/TM5deo/1" target="_blank"&gt;https://regex101.com/r/TM5deo/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;if it doesn't run in Splunk, use three backslashes where there are two.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;SEDCMD = s/.*/ParentProcessName\s*\=\s*C:\\\Program\sFiles\\\SplunkUniversalForwarder\\\bin\\\splunkd\.exe/g&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 12:48:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646815#M109988</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-06-13T12:48:51Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646821#M109990</link>
      <description>&lt;P&gt;Unfortunately is not working&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 13:17:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646821#M109990</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-13T13:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646822#M109991</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240690"&gt;@DanAlexander&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;are you sure that your logs have sourcetype=&lt;SPAN&gt;XmlWinEventLog ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ciao.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Giuseppe&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 13:30:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646822#M109991</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-06-13T13:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646827#M109993</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I am sure the below:&lt;/P&gt;&lt;P&gt;source=XmlWinEventLog:Security with sourcetype=XmlWinEventLog&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 14:24:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646827#M109993</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-13T14:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646837#M109996</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240690"&gt;@DanAlexander&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;only for testing, please try:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;SEDCMD = s/.*/ParentProcessName/g&lt;/LI-CODE&gt;&lt;P&gt;If this runs, the problem is the regex for the substitution.&lt;/P&gt;&lt;P&gt;ciao.&lt;/P&gt;&lt;P&gt;giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 14:55:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646837#M109996</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-06-13T14:55:44Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646842#M109998</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I cannot test it in production as one of the indexers throughs a replication error and I had to rollback.&lt;/P&gt;&lt;P&gt;All regexes work but when adding to the Splunk TA Windows under local props would not work and logs are of the same size.&lt;/P&gt;&lt;P&gt;Any other thoughts, please?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 15:29:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646842#M109998</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-13T15:29:58Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646923#M110010</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240690"&gt;@DanAlexander&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;could you use a test system with the same configurations?&lt;/P&gt;&lt;P&gt;I hinted this test because&amp;nbsp; all the times I had to work with regexes containing backslasher I found problems in Splunk, but the SEDCMD I share should be correct.&lt;/P&gt;&lt;P&gt;For this reason I'd like to understand if the problem is inside or outside the regex, to be focused on the issue.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 07:18:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646923#M110010</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-06-14T07:18:40Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646937#M110011</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did add the below to one of our indexers in /opt/splunk/etc/system/local/props.conf for testing as the highest precedence and searched specifically for events coming from that particular indexer and still no changes seen&lt;/P&gt;&lt;P&gt;WinEventLog]&lt;/P&gt;&lt;P&gt;SEDCMD=s/.*/ParentProcessName/g&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[wineventlog]&lt;/P&gt;&lt;P&gt;SEDCMD=s/.*/ParentProcessName/g&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[xmlwineventlog]&lt;/P&gt;&lt;P&gt;SEDCMD=s/.*/ParentProcessName/g&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[XmlWinEventLog]&lt;/P&gt;&lt;P&gt;SEDCMD=s/.*/ParentProcessName/g&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[source::WinEventLog:Security]&lt;/P&gt;&lt;P&gt;SEDCMD=s/.*/ParentProcessName/g&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[WinEventLog:Security]&lt;/P&gt;&lt;P&gt;SEDCMD=s/.*/ParentProcessName/g&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[WinEventLog:ForwardedEvents]&lt;/P&gt;&lt;P&gt;SEDCMD=s/.*/ParentProcessName/g&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[source::WinEventLog:ForwardedEvents]&lt;/P&gt;&lt;P&gt;SEDCMD=s/.*/ParentProcessName/g&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 08:58:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646937#M110011</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-14T08:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646939#M110012</link>
      <description>&lt;P&gt;Apologies, for clarification the opening [ is there it was a copy/paste typo my side.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 09:02:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/646939#M110012</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-14T09:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/647095#M110040</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240690"&gt;@DanAlexander&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;is there an intermediate Heavy Forwarder between the Universal Forwarder and the Indexers?&lt;/P&gt;&lt;P&gt;If yes, put this configuration also on these Heavy Forwarders.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 06:27:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/647095#M110040</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-06-15T06:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/647129#M110042</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;We do not have any HF and UF forwarding directly to our indexers.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 09:44:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/647129#M110042</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-15T09:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: Help with SEDCMD raw event size reduction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/647130#M110043</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240690"&gt;@DanAlexander&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;for my knowledge this parameter should run on Indexers (or HF if present), but only for test, could you add the SEDCMD also ti the props on UF?&lt;/P&gt;&lt;P&gt;Ciao,&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 09:47:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-SEDCMD-raw-event-size-reduction/m-p/647130#M110043</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-06-15T09:47:37Z</dc:date>
    </item>
  </channel>
</rss>

