<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to use regex to filter out Windows events with Account names ending with $? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/339573#M100701</link>
    <description>&lt;P&gt;I recommend not using a regular expression.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;base search&amp;gt; NOT (EventCode="4634" OR Account_Name="*$")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you're set on using regular expressions, try the following.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;base search&amp;gt;
| regex Account_Name!="\$$"
| regex EventCode!="4634"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Both searches assume you've extracted those fields. You can create a regular expression to search against the raw field, but I recommend searching against extracted fields.&lt;/P&gt;

&lt;P&gt;If you want to go a step further, try mapping it to the Splunk CIM, and then searching against the CIM field names.&lt;/P&gt;</description>
    <pubDate>Thu, 14 Sep 2017 21:32:33 GMT</pubDate>
    <dc:creator>malvidin</dc:creator>
    <dc:date>2017-09-14T21:32:33Z</dc:date>
    <item>
      <title>How to use regex to filter out Windows events with Account names ending with $?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/339572#M100700</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;

&lt;P&gt;How to edit props.conf and transforms.conf to exclude the windows events with event Codes 4634 at indexing time and Account_Name ending with $? Below is the sample event&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/3505i3FCAE228934A2531/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2017 21:14:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/339572#M100700</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-09-14T21:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to use regex to filter out Windows events with Account names ending with $?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/339573#M100701</link>
      <description>&lt;P&gt;I recommend not using a regular expression.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;base search&amp;gt; NOT (EventCode="4634" OR Account_Name="*$")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you're set on using regular expressions, try the following.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;base search&amp;gt;
| regex Account_Name!="\$$"
| regex EventCode!="4634"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Both searches assume you've extracted those fields. You can create a regular expression to search against the raw field, but I recommend searching against extracted fields.&lt;/P&gt;

&lt;P&gt;If you want to go a step further, try mapping it to the Splunk CIM, and then searching against the CIM field names.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2017 21:32:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/339573#M100701</guid>
      <dc:creator>malvidin</dc:creator>
      <dc:date>2017-09-14T21:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to use regex to filter out Windows events with Account names ending with $?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/339574#M100702</link>
      <description>&lt;P&gt;I want to ignore them at indexing time&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2017 21:33:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/339574#M100702</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-09-14T21:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to use regex to filter out Windows events with Account names ending with $?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/339575#M100703</link>
      <description>&lt;P&gt;I recommend changing your question title and summary to include the information from your comment, or you might get answers that don't address your situation.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2017 21:51:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/339575#M100703</guid>
      <dc:creator>malvidin</dc:creator>
      <dc:date>2017-09-14T21:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to use regex to filter out Windows events with Account names ending with $?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/339576#M100704</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Why don't  you try blacklist in inputs.conf if you are on universal forwarder?&lt;BR /&gt;
[your stanza / what you are monitoring]&lt;BR /&gt;
    blacklist = 400&lt;BR /&gt;
will ignore all 400 type errors&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2017 17:06:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/339576#M100704</guid>
      <dc:creator>Sukisen1981</dc:creator>
      <dc:date>2017-09-15T17:06:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to use regex to filter out Windows events with Account names ending with $?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/530173#M149794</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/168759"&gt;@kiran331&lt;/a&gt;&amp;nbsp;Did you find the correct regex to blacklist Account name ending with $ at index time&lt;/P&gt;</description>
      <pubDate>Fri, 20 Nov 2020 09:22:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-regex-to-filter-out-Windows-events-with-Account-names/m-p/530173#M149794</guid>
      <dc:creator>istutig</dc:creator>
      <dc:date>2020-11-20T09:22:22Z</dc:date>
    </item>
  </channel>
</rss>

