<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WinEventLog Security Regex in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-Regex/m-p/86491#M17982</link>
    <description>&lt;P&gt;What would be syntax for adding to the regex. I've only seen examples of addting two variables to a regex, not three or four.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Oct 2012 12:41:42 GMT</pubDate>
    <dc:creator>barne_dn</dc:creator>
    <dc:date>2012-10-16T12:41:42Z</dc:date>
    <item>
      <title>WinEventLog Security Regex</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-Regex/m-p/86489#M17980</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;

&lt;P&gt;I have windows security event filter setup and working on my indexer. However I want to filter on three variables. &lt;/P&gt;

&lt;P&gt;The logic is as follows: Keep all events, except the ones that match the regex.&lt;/P&gt;

&lt;P&gt;My current filter looks like this:&lt;/P&gt;

&lt;P&gt;[dropevents]&lt;BR /&gt;
REGEX = (?msi)^EventCode=(123|678|910).*^(User=userxxx)&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;I want to add one more variable to the filter (Type=Success Audit).&lt;/P&gt;

&lt;P&gt;Also, in the future I may want to add a hostname to this regex, so that it only filters out these events on a certain host, so once host name is added it would be filtering on 4 variables.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2012 20:02:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-Regex/m-p/86489#M17980</guid>
      <dc:creator>barne_dn</dc:creator>
      <dc:date>2012-10-10T20:02:22Z</dc:date>
    </item>
    <item>
      <title>Re: WinEventLog Security Regex</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-Regex/m-p/86490#M17981</link>
      <description>&lt;P&gt;Do you need to filter these independently or dependently? i.e. must we match the eventcode, type and user and host? or is it some combination, i.e eventcode+host or eventcode+user? for the former, just add to your regex, for the later, add multiple stanzas.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Oct 2012 22:27:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-Regex/m-p/86490#M17981</guid>
      <dc:creator>dturnbull_splun</dc:creator>
      <dc:date>2012-10-12T22:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: WinEventLog Security Regex</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-Regex/m-p/86491#M17982</link>
      <description>&lt;P&gt;What would be syntax for adding to the regex. I've only seen examples of addting two variables to a regex, not three or four.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2012 12:41:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-Regex/m-p/86491#M17982</guid>
      <dc:creator>barne_dn</dc:creator>
      <dc:date>2012-10-16T12:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: WinEventLog Security Regex</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-Regex/m-p/86492#M17983</link>
      <description>&lt;P&gt;This works like a charm. &lt;/P&gt;

&lt;P&gt;/opt/splunk/etc/system/local/transform.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;#Exclude Sample User Authentication Events
[nullFilter-user1]
REGEX=(?ism)EventCode\s*=\s*(123|456|789).*User\s*=\s*user
DEST_KEY=queue
FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;/opt/splunk/etc/system/local/props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::WinEventLog:Security]
TRANSFORMS-nullQ=nullFilter-user1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I do this to filter out all sorts of things. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;
Enjoy.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Nov 2012 17:01:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-Regex/m-p/86492#M17983</guid>
      <dc:creator>BP9906</dc:creator>
      <dc:date>2012-11-05T17:01:36Z</dc:date>
    </item>
  </channel>
</rss>

