<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Saving License on Windows Events - Regex &amp;quot;This event...&amp;quot; in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512465#M143735</link>
    <description>&lt;P&gt;Hi! i've been trying to regex some part of the windows events to save license. Many windows events contains a large part of text that begins with "This event is generated".&lt;/P&gt;
&lt;P&gt;I've edited props.conf:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[source::WinEventLog:Security]
TRANSFORMS-removedescription = removeEventDesc1

&lt;/LI-CODE&gt;
&lt;P&gt;and transforms.conf:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[removeEventDesc1]
LOOKAHEAD = 16128
REGEX = (?msi)(.*)This event is generated
DEST_KEY = _raw
FORMAT = $1&lt;/LI-CODE&gt;
&lt;P&gt;(based on this link&amp;nbsp;&lt;A href="https://www.hurricanelabs.com/splunk-tutorials/windows-event-log-filtering-design-in-splunk" target="_blank" rel="noopener"&gt;https://www.hurricanelabs.com/splunk-tutorials/windows-event-log-filtering-design-in-splunk&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;But isn't working.&lt;/P&gt;
&lt;P&gt;There is another way to do this?&lt;/P&gt;
&lt;P&gt;I've installed forwarders on my windows systems, and already blacklisted events with inputs.conf (that works)&lt;/P&gt;
&lt;P&gt;Thanks in advance and sorry for my english, im from Paraguay.&lt;/P&gt;</description>
    <pubDate>Wed, 05 Aug 2020 04:38:38 GMT</pubDate>
    <dc:creator>dieguiariel</dc:creator>
    <dc:date>2020-08-05T04:38:38Z</dc:date>
    <item>
      <title>Saving License on Windows Events - Regex "This event..."</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512465#M143735</link>
      <description>&lt;P&gt;Hi! i've been trying to regex some part of the windows events to save license. Many windows events contains a large part of text that begins with "This event is generated".&lt;/P&gt;
&lt;P&gt;I've edited props.conf:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[source::WinEventLog:Security]
TRANSFORMS-removedescription = removeEventDesc1

&lt;/LI-CODE&gt;
&lt;P&gt;and transforms.conf:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[removeEventDesc1]
LOOKAHEAD = 16128
REGEX = (?msi)(.*)This event is generated
DEST_KEY = _raw
FORMAT = $1&lt;/LI-CODE&gt;
&lt;P&gt;(based on this link&amp;nbsp;&lt;A href="https://www.hurricanelabs.com/splunk-tutorials/windows-event-log-filtering-design-in-splunk" target="_blank" rel="noopener"&gt;https://www.hurricanelabs.com/splunk-tutorials/windows-event-log-filtering-design-in-splunk&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;But isn't working.&lt;/P&gt;
&lt;P&gt;There is another way to do this?&lt;/P&gt;
&lt;P&gt;I've installed forwarders on my windows systems, and already blacklisted events with inputs.conf (that works)&lt;/P&gt;
&lt;P&gt;Thanks in advance and sorry for my english, im from Paraguay.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 04:38:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512465#M143735</guid>
      <dc:creator>dieguiariel</dc:creator>
      <dc:date>2020-08-05T04:38:38Z</dc:date>
    </item>
    <item>
      <title>Re: Saving License on Windows Events - Regex "This event..."</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512471#M143736</link>
      <description>&lt;P&gt;A slightly simpler method (from Splunk Add-on for Windows) uses &lt;FONT face="courier new,courier"&gt;SEDCMD&lt;/FONT&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;SEDCMD-clean_info_text_from_winsystem_events_this_event = s/This [Ee]vent is generated[\S\s\r\n]+$//g&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 23:54:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512471#M143736</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-08-04T23:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Saving License on Windows Events - Regex "This event..."</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512487#M143741</link>
      <description>&lt;P&gt;If you have already blacklisted on universal forwarder why do you want to do it at heavy forwarder level.&lt;/P&gt;&lt;P&gt;the best recommended way of blacklisting windows events is using universal forwarder.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 03:46:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512487#M143741</guid>
      <dc:creator>thambisetty</dc:creator>
      <dc:date>2020-08-05T03:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: Saving License on Windows Events - Regex "This event..."</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512605#M143777</link>
      <description>&lt;P&gt;Hi, thanks for your response, I have a master server and an indexer server separately. I've installed the deployment server on the master.&amp;nbsp; The&amp;nbsp;&lt;SPAN&gt;Splunk Add-on for Windows must be installed in this case on both?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(based on&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/WindowsAddOn/8.0.0/User/Install" target="_blank"&gt;https://docs.splunk.com/Documentation/WindowsAddOn/8.0.0/User/Install )&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;And later push the addon to the universal forwarders with the deployment server.&lt;/P&gt;&lt;P&gt;I will try this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 15:48:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512605#M143777</guid>
      <dc:creator>dieguiariel</dc:creator>
      <dc:date>2020-08-05T15:48:14Z</dc:date>
    </item>
    <item>
      <title>Re: Saving License on Windows Events - Regex "This event..."</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512607#M143779</link>
      <description>&lt;P&gt;So this regex must be on the universal forwarder app folder? I will try this too. Thanks for your reply&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 15:49:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512607#M143779</guid>
      <dc:creator>dieguiariel</dc:creator>
      <dc:date>2020-08-05T15:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: Saving License on Windows Events - Regex "This event..."</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512623#M143787</link>
      <description>&lt;P&gt;Okay. Please like the answer if it solves your questions.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 18:03:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/512623#M143787</guid>
      <dc:creator>thambisetty</dc:creator>
      <dc:date>2020-08-05T18:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: Saving License on Windows Events - Regex "This event..."</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/513062#M143946</link>
      <description>&lt;P&gt;Thanks, ive installed the addon, create a serverclass with some windows and deploy the app to the servers and its working. It seems that this has changed also the format of logs to xml.&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 17:45:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/513062#M143946</guid>
      <dc:creator>dieguiariel</dc:creator>
      <dc:date>2020-08-07T17:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: Saving License on Windows Events - Regex "This event..."</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/513064#M143947</link>
      <description>&lt;P&gt;i've manually edit the universal forwarder files on the windows machine but seems that this regex need the Windows addon, without it doesnt make any difference.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 17:47:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/513064#M143947</guid>
      <dc:creator>dieguiariel</dc:creator>
      <dc:date>2020-08-07T17:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: Saving License on Windows Events - Regex "This event..."</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/513066#M143949</link>
      <description>&lt;P&gt;not really you just need inputs.conf, you don't need to push complete TA.&lt;/P&gt;&lt;P&gt;for example:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog://Security]
disabled = 0
index = windows
#blacklist1 = EventCode=%^4663$% # example blacklist all 4663 event codes
#blacklist6 = EventCode = "4663" Message = "Process Name:\s+\\Device\\HarddiskVolume6\\Tomcat\\bin\\Tomcat9.exe" # blacklist Tomcat from EventCode 4663&lt;/LI-CODE&gt;&lt;P&gt;Note: blacklists statements are commented&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.5/Data/MonitorWindowseventlogdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.5/Data/MonitorWindowseventlogdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 18:02:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/513066#M143949</guid>
      <dc:creator>thambisetty</dc:creator>
      <dc:date>2020-08-07T18:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: Saving License on Windows Events - Regex "This event..."</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/513385#M144034</link>
      <description>&lt;P&gt;Yes, i've successfully blacklisted and whitelisted events with eventcoodes just with inputs.conf, but i couldn't "filter" the text inside the event, i need one eventcode but i don't need the text inside the event that begins with "this event is generated..."&lt;/P&gt;&lt;P&gt;Only pushing the complete TA from windows i been able to do that. I get the event but not the part with "This event is generated..."&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 15:32:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Saving-License-on-Windows-Events-Regex-quot-This-event-quot/m-p/513385#M144034</guid>
      <dc:creator>dieguiariel</dc:creator>
      <dc:date>2020-08-10T15:32:13Z</dc:date>
    </item>
  </channel>
</rss>

