<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How To Filter Only administrator logins in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88725#M18401</link>
    <description>&lt;P&gt;First,  you need to know the sourcetype for this data. I assume that the sourcetype is WinEventLog:Security. Second, these configurations should go on the indexer(s) or heavy forwarder - not the Universal Forwarder.&lt;/P&gt;

&lt;P&gt;In props.conf:  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]
TRANSFORMS-set= setnull,setparsing
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In transforms.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX = EventCode=(?:528| 529| 538)
DEST_KEY = queue
FORMAT = indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Please test this regular expression before committing this to production! I think I have it right, but my typing is not always the best!&lt;/P&gt;

&lt;P&gt;Documentation here:&lt;BR /&gt;&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Deploy/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest"&gt;Keep specific events and discard the rest&lt;/A&gt;  &lt;/P&gt;</description>
    <pubDate>Tue, 03 Jul 2012 17:52:49 GMT</pubDate>
    <dc:creator>lguinn2</dc:creator>
    <dc:date>2012-07-03T17:52:49Z</dc:date>
    <item>
      <title>How To Filter Only administrator logins</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88721#M18397</link>
      <description>&lt;P&gt;Good evening, i have this problem to solve:&lt;BR /&gt;
i've installed splunk web and a client machine with splunk heavy forwarder, how i can forward to indexer only administrators login?&lt;BR /&gt;
we have more than one network administrator's users with this suffix: ??admin (instead question marks we have two letters)&lt;BR /&gt;
i need only login-logout-failed login&lt;BR /&gt;
unfortunately i don't understand how to config files works (and tecnical english is so difficult for me)&lt;/P&gt;

&lt;P&gt;i've already read these links but i did't understand a lot, and the second link is uncomplete and it doesn't work.. (surely because i've lost a crucial part of setting)&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Deploy/Routeandfilterdatad"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Deploy/Routeandfilterdatad&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;&lt;A href="http://splunk-base.splunk.com/answers/9076/how-to-configure-a-forwarder-to-filter-and-send-only-the-events-i-want"&gt;http://splunk-base.splunk.com/answers/9076/how-to-configure-a-forwarder-to-filter-and-send-only-the-events-i-want&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;this is my first time who i need to modify config files witouth UI&lt;BR /&gt;
if you can tell me the right settings i would be grateful, thank you very much (and i apologize my possible grammar errors)&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jul 2012 20:27:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88721#M18397</guid>
      <dc:creator>angelo82</dc:creator>
      <dc:date>2012-07-02T20:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: How To Filter Only administrator logins</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88722#M18398</link>
      <description>&lt;P&gt;Can you give us a small sample of the raw log file? You can change the server names, ip addresses, etc. for security, but it would be very helpful to see 3-5 lines of the log file. If possible, I would like to see at least one entry for an administrator login and one entry for a regular user login.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jul 2012 22:32:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88722#M18398</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2012-07-02T22:32:17Z</dc:date>
    </item>
    <item>
      <title>Re: How To Filter Only administrator logins</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88723#M18399</link>
      <description>&lt;P&gt;this is an administrator login&lt;/P&gt;

&lt;P&gt;LogName=Security&lt;BR /&gt;
SourceName=Security&lt;BR /&gt;
EventCode=528&lt;BR /&gt;
EventType=8&lt;BR /&gt;
Type=Success Audit&lt;BR /&gt;
ComputerName=TEST-SPLUNK&lt;BR /&gt;
User=??admin&lt;BR /&gt;
Sid=(deleted)&lt;BR /&gt;
SidType=1&lt;BR /&gt;
Category=2&lt;BR /&gt;
CategoryString=Logon/Logoff&lt;BR /&gt;
RecordNumber=45077&lt;BR /&gt;
Message=Successful Logon:&lt;BR /&gt;
    User Name:??admin&lt;BR /&gt;
    Domain: Mydomain&lt;BR /&gt;
    Logon ID:(Deleted)&lt;BR /&gt;
    Logon Type:10&lt;BR /&gt;
    Logon Process:User32&lt;BR /&gt;&lt;BR /&gt;
    Authentication Package: Negotiate&lt;BR /&gt;
    Workstation Name:TEST-SPLUNK&lt;BR /&gt;
    Logon GUID:{deleted}&lt;BR /&gt;
    Caller User Name:TEST-SPLUNK$&lt;BR /&gt;
    Caller Domain:  Mydomain Caller Logon ID:   (deleted,deleted)&lt;BR /&gt;
    Caller Process ID: 2948&lt;BR /&gt;
    Transited Services: -&lt;BR /&gt;
    Source Network Address: &lt;EM&gt;.&lt;/EM&gt;.&lt;EM&gt;.&lt;/EM&gt;&lt;BR /&gt;
    Source Port:52948&lt;/P&gt;

&lt;P&gt;unfortunately i'm not in an office now to do power user login.. if it is necessary i'm going to do it more or less in 8 hours &lt;BR /&gt;
i need to log also EventCode:529 (failure audit) and EventCode:538 (user logoff)&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jul 2012 23:33:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88723#M18399</guid>
      <dc:creator>angelo82</dc:creator>
      <dc:date>2012-07-02T23:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: How To Filter Only administrator logins</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88724#M18400</link>
      <description>&lt;P&gt;there are other info requested:&lt;/P&gt;

&lt;P&gt;LOGOFF ADMIN:&lt;BR /&gt;
07/03/2012 03:04:33 PM&lt;/P&gt;

&lt;P&gt;LogName=Security&lt;BR /&gt;
SourceName=Security&lt;BR /&gt;
EventCode=538&lt;BR /&gt;
EventType=8&lt;BR /&gt;
Type=Success Audit&lt;BR /&gt;
ComputerName=TEST-SPLUNK&lt;BR /&gt;
User=??dmin&lt;BR /&gt;
Sid=(DELETED)&lt;BR /&gt;
SidType=1&lt;BR /&gt;
Category=2&lt;BR /&gt;
CategoryString=Logon/Logoff&lt;BR /&gt;
RecordNumber=45129&lt;BR /&gt;
Message=User Logoff:&lt;BR /&gt;&lt;BR /&gt;
User Name:  ??admin &lt;BR /&gt;
Domain:     MyDomain&lt;BR /&gt;&lt;BR /&gt;
Logon ID:       (0x0,0x3E0B1C4) &lt;BR /&gt;
Logon Type: 10 &lt;/P&gt;

&lt;P&gt;FAILED LOGIN&lt;/P&gt;

&lt;P&gt;07/03/2012 03:14:30PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Security&lt;BR /&gt;
EventCode=529&lt;BR /&gt;
EventType=16&lt;BR /&gt;
Type=Failure Audit&lt;BR /&gt;
ComputerName=TEST-SPLUNK&lt;BR /&gt;
User=SYSTEM&lt;BR /&gt;
Sid=(deleted)&lt;BR /&gt;
Sid Type=5&lt;BR /&gt;
Category=2&lt;BR /&gt;
CategoryString=Logon/Logoff&lt;BR /&gt;
RecordNumber=45131&lt;BR /&gt;
Message=Logon Failure:&lt;BR /&gt;&lt;BR /&gt;
Reason:     Unknown user name or bad password&lt;BR /&gt;&lt;BR /&gt;
User Name:  ??admin &lt;BR /&gt;
Domain:     MyDomain&lt;BR /&gt;&lt;BR /&gt;
Logon Type: 10&lt;BR /&gt;&lt;BR /&gt;
Logon Process:  User32&lt;BR /&gt;&lt;BR /&gt;
Authentication Package: Negotiate&lt;BR /&gt;&lt;BR /&gt;
Workstation Name:   TEST-SPLUNK &lt;BR /&gt;
Caller User Name:   TEST-SPLUNK$&lt;BR /&gt;&lt;BR /&gt;
Caller Domain:  MyDomain&lt;BR /&gt;&lt;BR /&gt;
Caller Logon ID:    (0x0,0x3E7) &lt;BR /&gt;
Caller Process ID:  1744&lt;BR /&gt;&lt;BR /&gt;
Transited Services: -&lt;BR /&gt;&lt;BR /&gt;
Source Network Address: ....&lt;BR /&gt;&lt;BR /&gt;
Source Port:    65220 &lt;/P&gt;

&lt;P&gt;POWER USER LOGON&lt;/P&gt;

&lt;P&gt;07/03/2012 03:18:30 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Security&lt;BR /&gt;
EventCode=528&lt;BR /&gt;
EventType=8&lt;BR /&gt;
Type=Success Audit&lt;BR /&gt;
ComputerName=TEST-SPLUNK&lt;BR /&gt;
User=pa00623&lt;BR /&gt;
Sid=(DELETED)&lt;BR /&gt;
SidType=1&lt;BR /&gt;
Category=2&lt;BR /&gt;
CategoryString=Logon/Logoff&lt;BR /&gt;
RecordNumber=45139&lt;BR /&gt;
Message=Successful Logon:&lt;BR /&gt;&lt;BR /&gt;
User Name:  pa***** &lt;BR /&gt;
Domain:     MyDomain&lt;BR /&gt;&lt;BR /&gt;
Logon ID:       (0x0,0x4064B5D) &lt;BR /&gt;
Logon Type: 10&lt;BR /&gt;&lt;BR /&gt;
Logon Process:  User32&lt;BR /&gt;&lt;BR /&gt;
Authentication Package: Negotiate&lt;BR /&gt;&lt;BR /&gt;
Workstation Name:   TEST-SPLUNK &lt;BR /&gt;
Logon GUID: {DELETED}&lt;BR /&gt;&lt;BR /&gt;
Caller User Name:   TEST-SPLUNK$&lt;BR /&gt;&lt;BR /&gt;
Caller Domain:  MyDomain&lt;BR /&gt;&lt;BR /&gt;
Caller Logon ID:    (0x0,0x3E7) &lt;BR /&gt;
Caller Process ID: 2296 &lt;BR /&gt;
Transited Services: -&lt;BR /&gt;&lt;BR /&gt;
Source Network Address: ... &lt;BR /&gt;
Source Port:    65253&lt;/P&gt;

&lt;P&gt;I hope this could be useful to help me&lt;BR /&gt;
Thank You &lt;/P&gt;</description>
      <pubDate>Tue, 03 Jul 2012 13:24:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88724#M18400</guid>
      <dc:creator>angelo82</dc:creator>
      <dc:date>2012-07-03T13:24:10Z</dc:date>
    </item>
    <item>
      <title>Re: How To Filter Only administrator logins</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88725#M18401</link>
      <description>&lt;P&gt;First,  you need to know the sourcetype for this data. I assume that the sourcetype is WinEventLog:Security. Second, these configurations should go on the indexer(s) or heavy forwarder - not the Universal Forwarder.&lt;/P&gt;

&lt;P&gt;In props.conf:  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]
TRANSFORMS-set= setnull,setparsing
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In transforms.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX = EventCode=(?:528| 529| 538)
DEST_KEY = queue
FORMAT = indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Please test this regular expression before committing this to production! I think I have it right, but my typing is not always the best!&lt;/P&gt;

&lt;P&gt;Documentation here:&lt;BR /&gt;&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Deploy/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest"&gt;Keep specific events and discard the rest&lt;/A&gt;  &lt;/P&gt;</description>
      <pubDate>Tue, 03 Jul 2012 17:52:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88725#M18401</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2012-07-03T17:52:49Z</dc:date>
    </item>
    <item>
      <title>Re: How To Filter Only administrator logins</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88726#M18402</link>
      <description>&lt;P&gt;I apologize for my delay,&lt;/P&gt;

&lt;P&gt;i've solved with this string:&lt;/P&gt;

&lt;P&gt;[setparsing]&lt;BR /&gt;
REGEX = User=(?:\w*admin\w*|Administrator)&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = indexQueue&lt;/P&gt;

&lt;P&gt;the better way to index administrators' login for our needs&lt;/P&gt;

&lt;P&gt;thank you very much for your advice&lt;/P&gt;

&lt;P&gt;Angelo&lt;/P&gt;

&lt;P&gt;p.s. the character "backslash" is not shown&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 12:04:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88726#M18402</guid>
      <dc:creator>angelo82</dc:creator>
      <dc:date>2020-09-28T12:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: How To Filter Only administrator logins</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88727#M18403</link>
      <description>&lt;P&gt;&lt;CODE&gt;[setparsing]&lt;BR /&gt;
REGEX = User=(?:\w*admin\w*|Administrator)&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = indexQueue&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;(Using backtics around the text to solve the "doesn't show backslash" problem)&lt;/P&gt;

&lt;P&gt;And I can see that checking for the user name would be superior to testing for event codes...&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jul 2012 18:34:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-To-Filter-Only-administrator-logins/m-p/88727#M18403</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2012-07-13T18:34:17Z</dc:date>
    </item>
  </channel>
</rss>

