<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to filter out Windows events logs based on words? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116378#M24286</link>
    <description>&lt;P&gt;Hi Martin, Thanks for your reply.&lt;/P&gt;

&lt;P&gt;I checked all you wrote and it's not the issue.&lt;/P&gt;

&lt;P&gt;Am I using the right regex to filler out this event and have Splunk not index it?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Sun, 12 Jul 2015 18:51:02 GMT</pubDate>
    <dc:creator>Rotema</dc:creator>
    <dc:date>2015-07-12T18:51:02Z</dc:date>
    <item>
      <title>How to filter out Windows events logs based on words?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116376#M24284</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I'm trying to filter out specific windows event log that's  Id=0 &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;This is the event:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;ERROR 2015-07-12 13:11:31,270 There is no security-data for the current context.. Occured in method:"Register", in process:"w3wp"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Stack trace:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; at iFOREX.Security.Context.SecurityDataProvider.AssertExists() in d:\BuildAreas\RelFxnet3\FX3-81\Source\iFOREX Framework\iFOREX.Security\iFOREX.Security\Context\SecurityDataProvider.cs:line 26
   at iFOREX.Clients.Web.Classes.AppGlobal.get_SecurityToken() in d:\BuildAreas\RelFxnet3\FX3-81\Source\iFOREX Framework\IFOREX.Clients\iFOREX.Clients.Web\BaseClasses\AppGlobal.cs:line 212
   at iFOREX.Clients.Web.Common.Utils.SecurityHelper.CheckSecurity(String checkSecurityParam, HttpSessionState session) in d:\BuildAreas\RelFxnet3\FX3-81\Source\iFOREX Framework\IFOREX.Clients\iFOREX.Clients.Web\Common\Utils\SecurityHelper.cs:line 55
   at iFOREX.Clients.Web.Common.Utils.SecurityHelper.CheckSecurity(HttpContext context) in d:\BuildAreas\RelFxnet3\FX3-81\Source\iFOREX Framework\IFOREX.Clients\iFOREX.Clients.Web\Common\Utils\SecurityHelper.cs:line 42
   at iFOREX.Clients.Web.Handlers.ClientState.OnProcessRequest(HttpContext context) in d:\BuildAreas\RelFxnet3\FX3-81\Source\iFOREX Framework\IFOREX.Clients\iFOREX.Clients.Web\Handlers\ClientState\ClientState.ashx.cs:line 64
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;What I tried: &lt;/P&gt;

&lt;P&gt;props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WMI:Applications]
TRANSFORMS-wmi=wminull1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[wminull1]
REGEX = There is no security-data for the current context
DEST_KEY=queue
FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But I can't seem to make it work and have Splunk not index this event. &lt;/P&gt;

&lt;P&gt;Can anyone please help?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jul 2015 13:21:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116376#M24284</guid>
      <dc:creator>Rotema</dc:creator>
      <dc:date>2015-07-12T13:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Windows events logs based on words?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116377#M24285</link>
      <description>&lt;P&gt;Make sure that...&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;your sourcetype matches &lt;CODE&gt;WMI:Applications&lt;/CODE&gt; exactly&lt;/LI&gt;
&lt;LI&gt;you set this on the indexers or heavy forwarders&lt;/LI&gt;
&lt;LI&gt;you restart the instances you set this on&lt;/LI&gt;
&lt;LI&gt;there are no configuration errors during restart&lt;/LI&gt;
&lt;LI&gt;you're looking at newly indexed data and not old data&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Sun, 12 Jul 2015 14:27:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116377#M24285</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2015-07-12T14:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Windows events logs based on words?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116378#M24286</link>
      <description>&lt;P&gt;Hi Martin, Thanks for your reply.&lt;/P&gt;

&lt;P&gt;I checked all you wrote and it's not the issue.&lt;/P&gt;

&lt;P&gt;Am I using the right regex to filler out this event and have Splunk not index it?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jul 2015 18:51:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116378#M24286</guid>
      <dc:creator>Rotema</dc:creator>
      <dc:date>2015-07-12T18:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Windows events logs based on words?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116379#M24287</link>
      <description>&lt;P&gt;My guess is that you have extra whitespace which you are not noticing; have you tested your RegEx against actual log messages?  If you can't/won't, then try this and see if it works:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;REGEX = There\s+is\s+no\s+security\s*-\s*data\s+for\s+the\s+current\s+context
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Bad RegEx is the only thing that makes sense if you are certain that you have checked everything else already mentioned.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2015 01:28:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116379#M24287</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-07-13T01:28:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Windows events logs based on words?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116380#M24288</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
if I use the regex There\s+is\s+no\s+security\s*-\s*data\s+for\s+the\s+current\s+context on the search line it works but if not on the transforms.conf&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 06:39:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116380#M24288</guid>
      <dc:creator>Rotema</dc:creator>
      <dc:date>2020-09-29T06:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Windows events logs based on words?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116381#M24289</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
if I use the regex There\s+is\s+no\s+security\s*-\s*data\s+for\s+the\s+current\s+context on the search line it works but if not on the transforms.conf&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 06:40:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116381#M24289</guid>
      <dc:creator>Rotema</dc:creator>
      <dc:date>2020-09-29T06:40:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Windows events logs based on words?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116382#M24290</link>
      <description>&lt;P&gt;Does your original RegEx work in the search bar, too?  Where exactly did you put your &lt;CODE&gt;props.conf&lt;/CODE&gt; and &lt;CODE&gt;transforms.conf&lt;/CODE&gt; files?  Did you spell the filenames correctly?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2015 14:19:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116382#M24290</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-07-13T14:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Windows events logs based on words?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116383#M24291</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I haven't tried it with the original regex just with this one: There\s+is\s+no\s+security\s*-\s*data\s+for\s+the\s+current\s+context&lt;/P&gt;

&lt;P&gt;So in the search line, if I enter:  sourcetype="WMI:WinEventLog:Applications" | regex There\s+is\s+no\s+security\s*-\s*data\s+for\s+the\s+current\s+context&lt;/P&gt;

&lt;P&gt;It seems to work and I do see the events&lt;/P&gt;

&lt;P&gt;Now, want i want to filter them out and have Splunk not index them, i use:&lt;BR /&gt;
Props.conf:&lt;BR /&gt;
[WMI:WinEventLog:Applications]&lt;BR /&gt;
TRANSFORMS-wmi = WinSecEvents-null&lt;/P&gt;

&lt;P&gt;Transforms.conf:&lt;BR /&gt;
[WinSecEvents-null]&lt;BR /&gt;
REGEX = There\s+is\s+no\s+security\s*-\s*data\s+for\s+the\s+current\s+context&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;

&lt;P&gt;And these doesn't seems to work. no matter what,  Splunk keep indexing them  and i See new entries.&lt;/P&gt;

&lt;P&gt;thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 06:40:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116383#M24291</guid>
      <dc:creator>Rotema</dc:creator>
      <dc:date>2020-09-29T06:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Windows events logs based on words?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116384#M24292</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
The issue was solved by using the following regex:&lt;BR /&gt;
REGEX = (?ms)There is no security-data for the current context&lt;/P&gt;

&lt;P&gt;Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 07:19:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116384#M24292</guid>
      <dc:creator>Rotema</dc:creator>
      <dc:date>2015-07-16T07:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Windows events logs based on words?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116385#M24293</link>
      <description>&lt;P&gt;Ah, the text was split across multiple lines inside a multi-line event.  That explains it.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 13:21:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-out-Windows-events-logs-based-on-words/m-p/116385#M24293</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-07-16T13:21:36Z</dc:date>
    </item>
  </channel>
</rss>

