<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using Heavy Forwarded to Send Subset of Data to 3rd Party and Not Index in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456057#M78857</link>
    <description>&lt;P&gt;Having issues with routing data to a 3rd party and then dropping the events from being indexed. The Windows event is being sent to the 3rd party but also is being indexed. I currently have a case open with support but wanted to ask the question to see if anyone has dealt with the issue before. &lt;/P&gt;

&lt;P&gt;-bash-4.2$ more props.conf&lt;BR /&gt;
[source::WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-pta = pta_syslog_filter&lt;/P&gt;

&lt;P&gt;[WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-eventcodes = badevents&lt;/P&gt;

&lt;P&gt;-bash-4.2$ more transforms.conf&lt;/P&gt;

&lt;H1&gt;Send eventcode 4624 to 3rd party&lt;/H1&gt;

&lt;P&gt;[pta_syslog_filter]&lt;BR /&gt;
REGEX = .&lt;EM&gt;EventCode=4624.&lt;/EM&gt;&lt;BR /&gt;
DEST_KEY =_SYSLOG_ROUTING&lt;BR /&gt;
FORMAT = pta_syslog&lt;/P&gt;

&lt;P&gt;Windows events to drop. If I add 4624 below, the events are not sent to 3rd party.&lt;BR /&gt;
[badevents]&lt;BR /&gt;
REGEX=(?m)EventCode=(4634|560|562|5156|4689|4648|4662|4769|5061|5058)&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;

&lt;P&gt;-bash-4.2$ more outputs.conf&lt;BR /&gt;
[tcpout]&lt;BR /&gt;
defaultGroup = default-autolb-group&lt;/P&gt;

&lt;P&gt;[syslog:pta_syslog]&lt;BR /&gt;
server = 3rdPartyHostIP:11514&lt;BR /&gt;
sendCookedData = false&lt;BR /&gt;
type=udp&lt;BR /&gt;
timestampformat = %s&lt;/P&gt;

&lt;P&gt;Splunk indexers&lt;BR /&gt;
[tcpout:default-autolb-group]&lt;BR /&gt;
server = indexer1:9997, indexer2:9997&lt;BR /&gt;
autoLB = true&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 00:31:13 GMT</pubDate>
    <dc:creator>kmattox</dc:creator>
    <dc:date>2020-09-30T00:31:13Z</dc:date>
    <item>
      <title>Using Heavy Forwarded to Send Subset of Data to 3rd Party and Not Index</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456057#M78857</link>
      <description>&lt;P&gt;Having issues with routing data to a 3rd party and then dropping the events from being indexed. The Windows event is being sent to the 3rd party but also is being indexed. I currently have a case open with support but wanted to ask the question to see if anyone has dealt with the issue before. &lt;/P&gt;

&lt;P&gt;-bash-4.2$ more props.conf&lt;BR /&gt;
[source::WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-pta = pta_syslog_filter&lt;/P&gt;

&lt;P&gt;[WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-eventcodes = badevents&lt;/P&gt;

&lt;P&gt;-bash-4.2$ more transforms.conf&lt;/P&gt;

&lt;H1&gt;Send eventcode 4624 to 3rd party&lt;/H1&gt;

&lt;P&gt;[pta_syslog_filter]&lt;BR /&gt;
REGEX = .&lt;EM&gt;EventCode=4624.&lt;/EM&gt;&lt;BR /&gt;
DEST_KEY =_SYSLOG_ROUTING&lt;BR /&gt;
FORMAT = pta_syslog&lt;/P&gt;

&lt;P&gt;Windows events to drop. If I add 4624 below, the events are not sent to 3rd party.&lt;BR /&gt;
[badevents]&lt;BR /&gt;
REGEX=(?m)EventCode=(4634|560|562|5156|4689|4648|4662|4769|5061|5058)&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;

&lt;P&gt;-bash-4.2$ more outputs.conf&lt;BR /&gt;
[tcpout]&lt;BR /&gt;
defaultGroup = default-autolb-group&lt;/P&gt;

&lt;P&gt;[syslog:pta_syslog]&lt;BR /&gt;
server = 3rdPartyHostIP:11514&lt;BR /&gt;
sendCookedData = false&lt;BR /&gt;
type=udp&lt;BR /&gt;
timestampformat = %s&lt;/P&gt;

&lt;P&gt;Splunk indexers&lt;BR /&gt;
[tcpout:default-autolb-group]&lt;BR /&gt;
server = indexer1:9997, indexer2:9997&lt;BR /&gt;
autoLB = true&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 00:31:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456057#M78857</guid>
      <dc:creator>kmattox</dc:creator>
      <dc:date>2020-09-30T00:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: Using Heavy Forwarded to Send Subset of Data to 3rd Party and Not Index</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456058#M78858</link>
      <description>&lt;P&gt;You are very close. All You need is just to put the transforms in sequence and then you can add 4624 also to your &lt;CODE&gt;badevents&lt;/CODE&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]
TRANSFORMS-pta = pta_syslog_filter, badevents
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Please note; I'ven't verified your REGEX is correct or NOT. I was just saying the approach only.&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2019 20:38:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456058#M78858</guid>
      <dc:creator>koshyk</dc:creator>
      <dc:date>2019-05-15T20:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: Using Heavy Forwarded to Send Subset of Data to 3rd Party and Not Index</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456059#M78859</link>
      <description>&lt;P&gt;Thanks for the suggestion but unfortunately I am getting the same result after making the changes.  EventCode 4624 is still being indexed. Any other thoughts of what it could be?&lt;/P&gt;

&lt;P&gt;-bash-4.2$ more props.conf&lt;BR /&gt;
[source::WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-pta = pta_syslog_filter, badevents&lt;/P&gt;

&lt;P&gt;-bash-4.2$ more transforms.conf&lt;BR /&gt;
[pta_syslog_filter]&lt;BR /&gt;
REGEX = .&lt;EM&gt;EventCode=4624.&lt;/EM&gt;&lt;BR /&gt;
DEST_KEY =_SYSLOG_ROUTING&lt;BR /&gt;
FORMAT = pta_syslog&lt;/P&gt;

&lt;P&gt;[badevents]&lt;BR /&gt;
REGEX=(?m)EventCode=(4634|560|562|5156|4689|4648|4662|4769|5061|5058)&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 00:31:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456059#M78859</guid>
      <dc:creator>kmattox</dc:creator>
      <dc:date>2020-09-30T00:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: Using Heavy Forwarded to Send Subset of Data to 3rd Party and Not Index</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456060#M78860</link>
      <description>&lt;P&gt;that's coz you haven't put 4624 in your REGEX&lt;BR /&gt;
Try..&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[badevents]
REGEX=(?m)EventCode=(4624|4634|560|562|5156|4689|4648|4662|4769|5061|5058)
DEST_KEY=queue
FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 17 May 2019 12:43:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456060#M78860</guid>
      <dc:creator>koshyk</dc:creator>
      <dc:date>2019-05-17T12:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: Using Heavy Forwarded to Send Subset of Data to 3rd Party and Not Index</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456061#M78861</link>
      <description>&lt;P&gt;When I add 4624 to my REGEX, the events are not sent to the 3rd party. Is there a way to send 4624 events on the HF and then drop the events when they get to the indexers?&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 14:35:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456061#M78861</guid>
      <dc:creator>kmattox</dc:creator>
      <dc:date>2019-05-17T14:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: Using Heavy Forwarded to Send Subset of Data to 3rd Party and Not Index</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456062#M78862</link>
      <description>&lt;P&gt;if you put the props.conf stanza with &lt;CODE&gt;pta_syslog_filter&lt;/CODE&gt; first, surely it will send to 3rd party and then ONLY action the &lt;CODE&gt;badevents&lt;/CODE&gt;. You may need to playaround with &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::WinEventLog:Security]
TRANSFORMS-pta = pta_syslog_filter, badevents
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[pta_syslog_filter]
REGEX = .*EventCode=4624.*
DEST_KEY =_SYSLOG_ROUTING
FORMAT = pta_syslog

[badevents]
REGEX=(?m)EventCode=(4624|4634|560|562|5156|4689|4648|4662|4769|5061|5058)
DEST_KEY=queue
FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Also you need to have stanza in outputs.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[syslog: pta_syslog]
server = loghost.example.com:514
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;to send it&lt;/P&gt;</description>
      <pubDate>Sat, 18 May 2019 10:37:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Using-Heavy-Forwarded-to-Send-Subset-of-Data-to-3rd-Party-and/m-p/456062#M78862</guid>
      <dc:creator>koshyk</dc:creator>
      <dc:date>2019-05-18T10:37:05Z</dc:date>
    </item>
  </channel>
</rss>

