<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to filter off winevent code to capture only failure audit status? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25616#M4183</link>
    <description>&lt;P&gt;Hi, &lt;/P&gt;

&lt;P&gt;If two transformers are used, the first one routes all events to nullQueue, which we will not be able to capture any other events then??&lt;/P&gt;

&lt;P&gt;Your REGEX seems to be working fine and thanks for the link.&lt;/P&gt;</description>
    <pubDate>Tue, 10 Aug 2010 10:39:48 GMT</pubDate>
    <dc:creator>remy06</dc:creator>
    <dc:date>2010-08-10T10:39:48Z</dc:date>
    <item>
      <title>How to filter off winevent code to capture only failure audit status?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25612#M4179</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;How can I filter out "type=Success Audit" logs off a windows event and log only the failure logs?&lt;/P&gt;

&lt;P&gt;Currently I have this in transform.conf:&lt;BR /&gt;
[setnull]&lt;BR /&gt;
REGEX = (?m)^EventCode = 673&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue  &lt;/P&gt;

&lt;P&gt;It is filtering off all of 673 but now I will like to capture the failure logs of 673 but not the success logs.  &lt;/P&gt;

&lt;P&gt;Am just wondering if something like this can be done?&lt;BR /&gt;
REGEX = (?m)^(EventCode = 673)(type = "Success Audit")&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2010 09:00:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25612#M4179</guid>
      <dc:creator>remy06</dc:creator>
      <dc:date>2010-08-05T09:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter off winevent code to capture only failure audit status?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25613#M4180</link>
      <description>&lt;P&gt;I think something like this will work for you:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;REGEX = [\r\n]+EventCode=673[\r\n]+.*?[\r\n]+Type=Success Audit[\r\n]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I would recommend reading up on regex syntax here:  &lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;&lt;A href="http://www.regular-expressions.info/" rel="nofollow"&gt;http://www.regular-expressions.info/&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;/P&gt;

&lt;P&gt;On second glance, I'm not sure that your given example stanza should work the way you want it too.  If you have a regex that's matching EventCode=673, then only those events would be sent to the null queue and everything else would be indexed as normal.  So you really need a regex that matches everything but event code 673.  Then to meet your full requirements (filtering out the success messages), you would want a regex that filters out everything but failure 673 events.  Another approach is to use two transformers, the first one routes all events to the &lt;CODE&gt;nullQueue&lt;/CODE&gt;, and the second only matches your 673 failure messages and then sets the queue to &lt;CODE&gt;indexQueue&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;You may find some more helpful examples on how to do this here:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;&lt;A href="http://answers.splunk.com/questions/4816/winevent-filtering-on-heavy-forwarder" rel="nofollow"&gt;http://answers.splunk.com/questions/4816/winevent-filtering-on-heavy-forwarder&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 05 Aug 2010 20:43:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25613#M4180</guid>
      <dc:creator>Lowell</dc:creator>
      <dc:date>2010-08-05T20:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter off winevent code to capture only failure audit status?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25614#M4181</link>
      <description>&lt;P&gt;Do your WinEventLogs contain spaces between the keys and values.  For example, do you see "EventCode = 673", or "EventCode=673"?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2010 20:45:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25614#M4181</guid>
      <dc:creator>Lowell</dc:creator>
      <dc:date>2010-08-05T20:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter off winevent code to capture only failure audit status?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25615#M4182</link>
      <description>&lt;P&gt;I see Eventcode=673 without spaces.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Aug 2010 09:23:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25615#M4182</guid>
      <dc:creator>remy06</dc:creator>
      <dc:date>2010-08-10T09:23:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter off winevent code to capture only failure audit status?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25616#M4183</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;

&lt;P&gt;If two transformers are used, the first one routes all events to nullQueue, which we will not be able to capture any other events then??&lt;/P&gt;

&lt;P&gt;Your REGEX seems to be working fine and thanks for the link.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Aug 2010 10:39:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25616#M4183</guid>
      <dc:creator>remy06</dc:creator>
      <dc:date>2010-08-10T10:39:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter off winevent code to capture only failure audit status?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25617#M4184</link>
      <description>&lt;P&gt;I got it mistaken.It doesn't seem to be working..
Using the REGEX I've tried to filter off based on User instead:&lt;BR /&gt;
REGEX = [\r\n]+EventCode=673[\r\n]+.*?[\r\n]+User=SYSTEM[\r\n]&lt;BR /&gt;
But it doesn't work.&lt;/P&gt;

&lt;P&gt;Here is a sample of Windows event:&lt;BR /&gt;
08/05/10 05:39:03 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Security&lt;BR /&gt;
EventCode=673&lt;BR /&gt;
EventType=8&lt;BR /&gt;
Type=Success Audit&lt;BR /&gt;
ComputerName=ServerA&lt;BR /&gt;
User=SYSTEM&lt;BR /&gt;
..&lt;BR /&gt;
..&lt;BR /&gt;
..&lt;BR /&gt;
CategoryString=Account Logon&lt;BR /&gt;
..&lt;BR /&gt;
Message=Service Ticket Request:  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;User Name:      ServerA.com

User Domain:        ServerA.com

Service Name:       ServerA$

..  
    ..  

Failure Code:       -  

...  

Transited Services: -
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 13 Aug 2010 10:09:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25617#M4184</guid>
      <dc:creator>remy06</dc:creator>
      <dc:date>2010-08-13T10:09:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter off winevent code to capture only failure audit status?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25618#M4185</link>
      <description>&lt;P&gt;I did it like that:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[wminull]
REGEX = (?msi)^(EventCode=697|Type=Audit Success)
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So it simply filters EventCode=697 OR Type=Audit Success to the null queue&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2010 19:16:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25618#M4185</guid>
      <dc:creator>Daniel</dc:creator>
      <dc:date>2010-08-31T19:16:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter off winevent code to capture only failure audit status?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25619#M4186</link>
      <description>&lt;P&gt;I had to set something up like this.  They wanted a list of the top 20 failed login by userid.&lt;/P&gt;

&lt;P&gt;I set the following up as an event type:
index="prod_dc_event_logs" sourcetype="&lt;EM&gt;security&lt;/EM&gt;" Type="Failure Audit" EventCode="538" OR EventCode="540" OR EventCode="680" &lt;/P&gt;

&lt;P&gt;Then I set the following search up:
eventtype="WINTEL_FailedLogin" | chart count by Logon_account | sort 20 - count&lt;/P&gt;

&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2010 19:20:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25619#M4186</guid>
      <dc:creator>Brian_Osburn</dc:creator>
      <dc:date>2010-08-31T19:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter off winevent code to capture only failure audit status?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25620#M4187</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Thanks for the suggestions.&lt;BR /&gt;
This is working for us by capturing eventcode 578 AND Type=Audit Success :&lt;BR /&gt;
&lt;CODE&gt;REGEX = (?msi)^EventCode=578.*^(Type=Audit Success)&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2010 10:25:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-off-winevent-code-to-capture-only-failure-audit/m-p/25620#M4187</guid>
      <dc:creator>remy06</dc:creator>
      <dc:date>2010-10-19T10:25:44Z</dc:date>
    </item>
  </channel>
</rss>

