<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reducing Windows Security Events flow by filtering in parsing queue in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272631#M52373</link>
    <description>&lt;P&gt;I Tried : &lt;/P&gt;

&lt;H6&gt;#### Windows:Security&lt;/H6&gt;

&lt;P&gt;[setnull]&lt;BR /&gt;
REGEX = .&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;[secsetparsing2]&lt;BR /&gt;
REGEX=Administrator&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = indexQueue&lt;/P&gt;

&lt;P&gt;[secsetparsing]&lt;BR /&gt;
REGEX=(?m)^EventCode=(528|529)&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = indexQueue&lt;/P&gt;

&lt;P&gt;but still receive non Admin events altought REGEX=Administrator in Regex PCRE Standard means "every string that contains Administrator word". I suppose the filter is not working. Does exist a way to filter in the parsing queue on a field basis ?&lt;/P&gt;</description>
    <pubDate>Thu, 02 Feb 2017 09:41:30 GMT</pubDate>
    <dc:creator>fab73</dc:creator>
    <dc:date>2017-02-02T09:41:30Z</dc:date>
    <item>
      <title>Reducing Windows Security Events flow by filtering in parsing queue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272627#M52369</link>
      <description>&lt;P&gt;In order to filter out non-administrator logon events on WinEventLog:Security sourcetype, I inserted the following stanza in transforms.conf in proper position I suppose:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[secsetparsing2]
REGEX=User_Name!=Administrator
DEST_KEY = queue
FORMAT = nullQueue

[secsetparsing]
REGEX=(?m)^EventCode=(528|529|530)
DEST_KEY = queue
FORMAT = indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and in props.conf :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]     
TRANSFORMS-security=setnull,secsetparsing2,secsetparsing
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;but it doesn't work: events with User_Name different from Administrator are still coming in last minute to my indexers....any idea? Is there any error? I use Splunk 6.4.1. Any comment is appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 13:54:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272627#M52369</guid>
      <dc:creator>fab73</dc:creator>
      <dc:date>2017-02-01T13:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing Windows Security Events flow by filtering in parsing queue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272628#M52370</link>
      <description>&lt;P&gt;The secsetparsing2 REGEX is written as boolean expression. It should be regular expression, you can't evaluate as field value. Instead of moving non-admins to nullQueue, you can just send admin events to indexqueue, like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[secsetparsing2]
REGEX=User_Name=Administrator
DEST_KEY = queue
FORMAT = indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 01 Feb 2017 16:47:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272628#M52370</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-02-01T16:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing Windows Security Events flow by filtering in parsing queue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272629#M52371</link>
      <description>&lt;P&gt;Thanks. But which is the regular expression that match the string  &lt;/P&gt;

&lt;P&gt;"Nome utente:   Administrator" &lt;/P&gt;

&lt;P&gt;in source data? &lt;/P&gt;

&lt;P&gt;I have this event (a classic Windows Security event):&lt;/P&gt;

&lt;P&gt;"02/02/2017 10:06:49 AM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Security&lt;BR /&gt;
EventCode=529&lt;BR /&gt;
EventType=16&lt;BR /&gt;
Type=Failure Audit&lt;BR /&gt;
ComputerName=server01&lt;BR /&gt;
User=SYSTEM&lt;BR /&gt;
Sid=S-1-5-18&lt;BR /&gt;
SidType=1&lt;BR /&gt;
Category=2&lt;BR /&gt;
CategoryString=Accesso/fine sess.&lt;BR /&gt;
RecordNumber=1549305796&lt;BR /&gt;
Message=Accesso non riuscito:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Motivo:     Nome utente sconosciuto o password non valida

Nome utente:    Administrator

Dominio:        MyDomain

Tipo di accesso:    3
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;..."&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 09:16:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272629#M52371</guid>
      <dc:creator>fab73</dc:creator>
      <dc:date>2017-02-02T09:16:22Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing Windows Security Events flow by filtering in parsing queue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272630#M52372</link>
      <description>&lt;P&gt;Is the filter applied on source data of the event?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 09:23:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272630#M52372</guid>
      <dc:creator>fab73</dc:creator>
      <dc:date>2017-02-02T09:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing Windows Security Events flow by filtering in parsing queue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272631#M52373</link>
      <description>&lt;P&gt;I Tried : &lt;/P&gt;

&lt;H6&gt;#### Windows:Security&lt;/H6&gt;

&lt;P&gt;[setnull]&lt;BR /&gt;
REGEX = .&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;[secsetparsing2]&lt;BR /&gt;
REGEX=Administrator&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = indexQueue&lt;/P&gt;

&lt;P&gt;[secsetparsing]&lt;BR /&gt;
REGEX=(?m)^EventCode=(528|529)&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = indexQueue&lt;/P&gt;

&lt;P&gt;but still receive non Admin events altought REGEX=Administrator in Regex PCRE Standard means "every string that contains Administrator word". I suppose the filter is not working. Does exist a way to filter in the parsing queue on a field basis ?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 09:41:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272631#M52373</guid>
      <dc:creator>fab73</dc:creator>
      <dc:date>2017-02-02T09:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing Windows Security Events flow by filtering in parsing queue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272632#M52374</link>
      <description>&lt;P&gt;It works splitting the filters by mean of two sequence of tansforms in transforms.conf and props.conf&lt;/P&gt;

&lt;H3&gt;Windows:Security&lt;/H3&gt;

&lt;P&gt;[setnull]&lt;BR /&gt;
[secsetparsing]&lt;/P&gt;

&lt;H3&gt;Windows:Security&lt;/H3&gt;

&lt;P&gt;[setnull2]&lt;BR /&gt;
[secsetparsing2]&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 10:33:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Reducing-Windows-Security-Events-flow-by-filtering-in-parsing/m-p/272632#M52374</guid>
      <dc:creator>fab73</dc:creator>
      <dc:date>2017-02-02T10:33:30Z</dc:date>
    </item>
  </channel>
</rss>

