<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to send events in JSON format to NullQueue? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340335#M100940</link>
    <description>&lt;P&gt;Did you restart splunkd after making changes?&lt;/P&gt;</description>
    <pubDate>Thu, 02 Nov 2017 14:18:17 GMT</pubDate>
    <dc:creator>skoelpin</dc:creator>
    <dc:date>2017-11-02T14:18:17Z</dc:date>
    <item>
      <title>How to send events in JSON format to NullQueue?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340332#M100937</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;We are puling JSON data from cloud, can I trim out the events with EventId=5156 and 5158 from the events with sourcetype "mscs:storage:table". Below is the sample event and _raw event?&lt;/P&gt;

&lt;P&gt;{   [-] &lt;BR /&gt;
     Channel:    Security&lt;BR /&gt;&lt;BR /&gt;
     DeploymentId:   fgdfgfdgfdgfgngzser3&lt;BR /&gt;&lt;BR /&gt;
     Description:    The Windows Filtering Platform has permitted a connection.&lt;/P&gt;

&lt;P&gt;Application Information:&lt;BR /&gt;
    Process ID:     964&lt;BR /&gt;
    Application Name:   \device\harddisk\program files\splunkuniversalforwarder\bin\splunkd.exe&lt;/P&gt;

&lt;P&gt;Network Information:&lt;BR /&gt;
    Direction:      Outbound&lt;BR /&gt;
    Source Address:     1.11.12.13&lt;BR /&gt;
    Source Port:        57564&lt;BR /&gt;
    Destination Address:    21.22.23.24&lt;BR /&gt;
    Destination Port:       9997&lt;BR /&gt;
    Protocol:       6&lt;/P&gt;

&lt;P&gt;Filter Information:&lt;BR /&gt;
    Filter Run-Time ID: 119665&lt;BR /&gt;
    Layer Name:     Connect&lt;BR /&gt;
    Layer Run-Time ID:  48&lt;BR /&gt;&lt;BR /&gt;
     EventId:    5156&lt;BR /&gt;&lt;BR /&gt;
     EventTickCount:     4545656687812&lt;BR /&gt;&lt;BR /&gt;
     &lt;A href="mailto:EventTickCount@odata.type"&gt;EventTickCount@odata.type&lt;/A&gt;:  Edm.Int64&lt;BR /&gt;&lt;BR /&gt;
     Level:  0&lt;BR /&gt;&lt;BR /&gt;
     Opcode:     0&lt;BR /&gt;&lt;BR /&gt;
     PartitionKey:   565656548896&lt;BR /&gt;&lt;BR /&gt;
     Pid:    4&lt;BR /&gt;&lt;BR /&gt;
     PreciseTimeStamp:   2017-10-31T19:50:52.5322979Z&lt;BR /&gt;&lt;BR /&gt;
     &lt;A href="mailto:PreciseTimeStamp@odata.type"&gt;PreciseTimeStamp@odata.type&lt;/A&gt;:    Edm.DateTime&lt;BR /&gt;&lt;BR /&gt;
     ProviderGuid:   {asa-dfdfdf-4994-sads-fdfdf}&lt;BR /&gt;&lt;BR /&gt;
     ProviderName:   Microsoft-Windows-Security-Auditing&lt;BR /&gt;&lt;BR /&gt;
     RawXml:     &lt;EVENT xmlns="http://schemas.microsoft.com/win/2004/08/events/event"&gt;&lt;SYSTEM&gt;&lt;PROVIDER name="Microsoft-Windows-Security-Auditing" guid="{dfdf-5478-4994-fdf-df}"&gt;&lt;/PROVIDER&gt;&lt;EVENTID&gt;5156&lt;/EVENTID&gt;&lt;VERSION&gt;1&lt;/VERSION&gt;&lt;LEVEL&gt;0&lt;/LEVEL&gt;&lt;TASK&gt;12810&lt;/TASK&gt;&lt;OPCODE&gt;0&lt;/OPCODE&gt;&lt;KEYWORDS&gt;0x8020000000000000&lt;/KEYWORDS&gt;&lt;TIMECREATED systemtime="2017-10-31T19:50:52.532297900Z"&gt;&lt;/TIMECREATED&gt;&lt;EVENTRECORDID&gt;4344544&lt;/EVENTRECORDID&gt;&lt;CORRELATION&gt;&lt;/CORRELATION&gt;&lt;EXECUTION processid="4" threadid="14808"&gt;&lt;/EXECUTION&gt;&lt;CHANNEL&gt;Security&lt;/CHANNEL&gt;&lt;COMPUTER&gt;test.tt.com&lt;/COMPUTER&gt;&lt;SECURITY&gt;&lt;/SECURITY&gt;&lt;/SYSTEM&gt;&lt;EVENTDATA&gt;&lt;DATA name="ProcessID"&gt;964&lt;/DATA&gt;&lt;DATA name="Application"&gt;\device\harddisk\program files\splunkuniversalforwarder\bin\splunkd.exe&lt;/DATA&gt;&lt;DATA name="Direction"&gt;%%14593&lt;/DATA&gt;&lt;DATA name="SourceAddress"&gt;1.11.12.13&lt;/DATA&gt;&lt;DATA name="SourcePort"&gt;57564&lt;/DATA&gt;&lt;DATA name="DestAddress"&gt;21.22.23.24&lt;/DATA&gt;&lt;DATA name="DestPort"&gt;9997&lt;/DATA&gt;&lt;DATA name="Protocol"&gt;6&lt;/DATA&gt;&lt;DATA name="FilterRTID"&gt;119665&lt;/DATA&gt;&lt;DATA name="LayerName"&gt;%%14611&lt;/DATA&gt;&lt;DATA name="LayerRTID"&gt;48&lt;/DATA&gt;&lt;DATA name="RemoteUserID"&gt;S-1-0-0&lt;/DATA&gt;&lt;DATA name="RemoteMachineID"&gt;S-1-0-0&lt;/DATA&gt;&lt;/EVENTDATA&gt;&lt;/EVENT&gt;&lt;BR /&gt;&lt;BR /&gt;
     Role:   IaaS&lt;BR /&gt;&lt;BR /&gt;
     RoleInstance:   _test.tt.com&lt;BR /&gt;&lt;BR /&gt;
     RowIndex:   000000010755656&lt;BR /&gt;&lt;BR /&gt;
     RowKey:     dfttresttvsdfsfsf000000019 &lt;BR /&gt;
     TIMESTAMP:  2017-10-31T19:50:00Z&lt;BR /&gt;&lt;BR /&gt;
     &lt;A href="mailto:TIMESTAMP@odata.type"&gt;TIMESTAMP@odata.type&lt;/A&gt;:   Edm.DateTime&lt;BR /&gt;&lt;BR /&gt;
     Task:   12810&lt;BR /&gt;&lt;BR /&gt;
     Tid:    14808&lt;BR /&gt;&lt;BR /&gt;
     Timestamp:  2017-10-31T19:51:26.4589637Z&lt;BR /&gt;&lt;BR /&gt;
     odata.etag:     W/"datetime'2017-10-31T19%3A51%3A26.4589637Z'" &lt;BR /&gt;
}&lt;/P&gt;

&lt;P&gt;_raw event:&lt;/P&gt;

&lt;P&gt;{"Timestamp": "2017-10-31T19:51:26.4589637Z", "ProviderName": "Microsoft-Windows-Security-Auditing", "RawXml": "5156101281000x8020000000000000fdfdfe323Securitytest.tt.com964\device\harddis3\program files\splunkuniversalforwarder\bin\splunkd.exe%%145931.11.12.135756421.22.23.2499976119665%%1461148S-1-0-0S-1-0-0", "RowIndex": "0000000107374703779", "TIMESTAMP": "2017-10-31T19:50:00Z", "EventTickCount": "dfdf", "PartitionKey": "0636988789789835", "Tid": 14808, "Role": "IaaS", "&lt;A href="mailto:EventTickCount@odata.type"&gt;EventTickCount@odata.type&lt;/A&gt;": "Edm.Int64", "Channel": "Security", "Task": 12810, "&lt;A href="mailto:PreciseTimeStamp@odata.type"&gt;PreciseTimeStamp@odata.type&lt;/A&gt;": "Edm.DateTime", "PreciseTimeStamp": "2017-10-31T19:50:52.5322979Z", "Level": 0, "ProviderGuid": "{erer-5478-4994-errer-3E3B0328C30D}", "RoleInstance": "_test.tt.com", "&lt;A href="mailto:TIMESTAMP@odata.type"&gt;TIMESTAMP@odata.type&lt;/A&gt;": "Edm.DateTime", "EventId": 5156, "Description": "The Windows Filtering Platform has permitted a connection.\n\nApplication Information:\n\tProcess ID:\t\t964\n\tApplication Name:\t\device\harddisk\program files\splunkuniversalforwarder\bin\splunkd.exe\n\nNetwork Information:\n\tDirection:\t\tOutbound\n\tSource Address:\t\t1.11.12.13\n\tSource Port:\t\t57564\n\tDestination Address:\t21.22.23.24\n\tDestination Port:\t\t9997\n\tProtocol:\t\t6\n\nFilter Information:\n\tFilter Run-Time ID:\t119665\n\tLayer Name:\t\tConnect\n\tLayer Run-Time ID:\t48", "Pid": 4, "DeploymentId": "c9f4631c-fdfdfff-6a27dbd29a02", "odata.etag": "W/\"datetime'2017-10-31T19%3A51%3A26.4589637Z'\"", "RowKey": "c9f4631c-bf16-dferersfssdf&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2017 20:15:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340332#M100937</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-10-31T20:15:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to send events in JSON format to NullQueue?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340333#M100938</link>
      <description>&lt;P&gt;Try this &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;props.conf&lt;/CODE&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[mscs:storage:table]
 TRANSFORMS-DiscardWinEvents = eliminate-eventids
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;CODE&gt;transforms.conf&lt;/CODE&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; [eliminate-eventids]
 REGEX=EventId=(5156|5158)
 DEST_KEY=queue
 FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 01 Nov 2017 15:39:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340333#M100938</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2017-11-01T15:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to send events in JSON format to NullQueue?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340334#M100939</link>
      <description>&lt;P&gt;I tried this one on the Heavy forwarder, its not working.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 14:15:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340334#M100939</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-11-02T14:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to send events in JSON format to NullQueue?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340335#M100940</link>
      <description>&lt;P&gt;Did you restart splunkd after making changes?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 14:18:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340335#M100940</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2017-11-02T14:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to send events in JSON format to NullQueue?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340336#M100941</link>
      <description>&lt;P&gt;Yes, I restarted it.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 14:34:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340336#M100941</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-11-02T14:34:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to send events in JSON format to NullQueue?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340337#M100942</link>
      <description>&lt;P&gt;Your regex won't match. The _raw data contais this: ...,"EventId": 5156,... therefore your regex in the transforms.conf stanza should go like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;REGEX = \"EventId\":\s*(?:5156|5158)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 05 Dec 2017 07:54:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-send-events-in-JSON-format-to-NullQueue/m-p/340337#M100942</guid>
      <dc:creator>macvili</dc:creator>
      <dc:date>2017-12-05T07:54:27Z</dc:date>
    </item>
  </channel>
</rss>

