<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: regex  in eventlog security in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69816#M17492</link>
    <description>&lt;P&gt;Does your events look like that (single-line), or are they truly multi-line? &lt;/P&gt;

&lt;P&gt;One thing that springs to mind is that the actual log event does NOT contain the equals-to character (=). Also, I'm not sure that the accented 'e' might cause problems, so I wildcarded it, and added one-or-more whitespaces after the colon.&lt;/P&gt;

&lt;P&gt;Also, I removed the caret (start-of-line).&lt;/P&gt;

&lt;P&gt;Try;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;REGEX=(?msi)Acc.s:\s+(ReadAttributes|SYNCHRONIZE)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope this helps somewhat,&lt;/P&gt;

&lt;P&gt;Kristian&lt;/P&gt;</description>
    <pubDate>Thu, 21 Mar 2013 14:09:19 GMT</pubDate>
    <dc:creator>kristian_kolb</dc:creator>
    <dc:date>2013-03-21T14:09:19Z</dc:date>
    <item>
      <title>regex  in eventlog security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69814#M17490</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;
I tried a lot of solution to filter log events security without success.&lt;BR /&gt;
I wish i could filter evenbements following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Informations sur la demande d’accès :    Masque d’accès :     0x80    Accès :        ReadAttributes              Résultat de la vérification d’accès :  ReadAttributes: Accordé par    D:(A;;FA;;;WD)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I want to filter the word "accès".&lt;BR /&gt;
I tried this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[events-filter]
REGEX=(?msi)^Accès=(SYNCHRONIZE|ReadAttributes)\D
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;but it does not work.&lt;BR /&gt;
Do you have an idea to help me?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2013 13:48:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69814#M17490</guid>
      <dc:creator>jcollin</dc:creator>
      <dc:date>2013-03-21T13:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: regex  in eventlog security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69815#M17491</link>
      <description>&lt;P&gt;I'm not shure, what you want to do ...&lt;/P&gt;

&lt;P&gt;Do you want to filter all events where the string &lt;BR /&gt;
"Accès" AND ("SYNCHRONIZE" OR "ReadAttributes")&lt;BR /&gt;
occur?&lt;/P&gt;

&lt;P&gt;Would be useful to specify your request.&lt;BR /&gt;
Maybe it's better to filter by (known)fields like EventId, EventCode, etc. than plain strings ...&lt;/P&gt;

&lt;P&gt;Greetz Robert&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2013 14:03:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69815#M17491</guid>
      <dc:creator>Rocket66</dc:creator>
      <dc:date>2013-03-21T14:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: regex  in eventlog security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69816#M17492</link>
      <description>&lt;P&gt;Does your events look like that (single-line), or are they truly multi-line? &lt;/P&gt;

&lt;P&gt;One thing that springs to mind is that the actual log event does NOT contain the equals-to character (=). Also, I'm not sure that the accented 'e' might cause problems, so I wildcarded it, and added one-or-more whitespaces after the colon.&lt;/P&gt;

&lt;P&gt;Also, I removed the caret (start-of-line).&lt;/P&gt;

&lt;P&gt;Try;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;REGEX=(?msi)Acc.s:\s+(ReadAttributes|SYNCHRONIZE)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope this helps somewhat,&lt;/P&gt;

&lt;P&gt;Kristian&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2013 14:09:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69816#M17492</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-03-21T14:09:19Z</dc:date>
    </item>
    <item>
      <title>Re: regex  in eventlog security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69817#M17493</link>
      <description>&lt;P&gt;Hello Robert,&lt;BR /&gt;
I just want to filter events including the line "accès" contains "SYNCHRONIZE" or "ReadAttributes."&lt;BR /&gt;
EventCode field is not enough, it is the 5145 and there are many.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2013 14:21:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69817#M17493</guid>
      <dc:creator>jcollin</dc:creator>
      <dc:date>2013-03-21T14:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: regex  in eventlog security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69818#M17494</link>
      <description>&lt;P&gt;Hello kristian, my events are truly multi line.&lt;BR /&gt;
I try your solution ...&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2013 14:22:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69818#M17494</guid>
      <dc:creator>jcollin</dc:creator>
      <dc:date>2013-03-21T14:22:12Z</dc:date>
    </item>
    <item>
      <title>Re: regex  in eventlog security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69819#M17495</link>
      <description>&lt;P&gt;It does not seem to work.&lt;BR /&gt;
I attached a screenshot of the event that I want to filter:&lt;/P&gt;

&lt;P&gt;&lt;IMG src="http://img202.imageshack.us/img202/5816/20130321153055.png" alt="alt text" /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2013 14:36:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69819#M17495</guid>
      <dc:creator>jcollin</dc:creator>
      <dc:date>2013-03-21T14:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: regex  in eventlog security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69820#M17496</link>
      <description>&lt;P&gt;Try the regex as Kristian posted (mofidied) :&lt;/P&gt;

&lt;P&gt;(?msi)Accès\s+:\s+(ReadAttributes|SYNCHRONIZE)&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2013 15:18:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69820#M17496</guid>
      <dc:creator>Rocket66</dc:creator>
      <dc:date>2013-03-21T15:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: regex  in eventlog security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69821#M17497</link>
      <description>&lt;P&gt;Hello i tried tis regex but it dosen't work, i have always the events with ReadAttributes ...&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2013 15:37:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69821#M17497</guid>
      <dc:creator>jcollin</dc:creator>
      <dc:date>2013-03-21T15:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: regex  in eventlog security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69822#M17498</link>
      <description>&lt;P&gt;If you are new in regex - as I am &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; - try to use :&lt;BR /&gt;
&lt;STRONG&gt;&lt;EM&gt;Splunk's Field extractor (IFX)&lt;/EM&gt;&lt;/STRONG&gt; &lt;BR /&gt;
or this very usefull regex tester tool : &lt;STRONG&gt;&lt;EM&gt;&lt;A href="http://www.gskinner.com/RegExr/"&gt;http://www.gskinner.com/RegExr/&lt;/A&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Greetz Robert &lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2013 15:39:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69822#M17498</guid>
      <dc:creator>Rocket66</dc:creator>
      <dc:date>2013-03-21T15:39:21Z</dc:date>
    </item>
    <item>
      <title>Re: regex  in eventlog security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69823#M17499</link>
      <description>&lt;P&gt;I do not understand because I have tried my hand with a regex tester (Kodos) and in the same way the code is to detect the field, but in Splunk, data back anyway.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2013 15:53:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69823#M17499</guid>
      <dc:creator>jcollin</dc:creator>
      <dc:date>2013-03-21T15:53:49Z</dc:date>
    </item>
    <item>
      <title>Re: regex  in eventlog security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69824#M17500</link>
      <description>&lt;P&gt;Hello, I tried with IFX, the problem is that the fields are extracted as the first, the "accès" does not appear:&lt;BR /&gt;
&lt;IMG src="http://imageshack.us/a/img715/7018/20130322090613.png" alt="alt text" /&gt;&lt;/P&gt;

&lt;P&gt;If I display "view source" fields are visible :&lt;BR /&gt;
&lt;IMG src="http://img404.imageshack.us/img404/2163/20130322091540.png" alt="alt text" /&gt;&lt;/P&gt;

&lt;P&gt;On the Regex tester tool it is ok :&lt;BR /&gt;
&lt;IMG src="http://img515.imageshack.us/img515/5418/20130322092555.png" alt="alt text" /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2013 08:27:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69824#M17500</guid>
      <dc:creator>jcollin</dc:creator>
      <dc:date>2013-03-22T08:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: regex  in eventlog security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69825#M17501</link>
      <description>&lt;P&gt;Where are you trying to filter this? On an indexer or a forwarder?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2013 08:35:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/regex-in-eventlog-security/m-p/69825#M17501</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-03-22T08:35:26Z</dc:date>
    </item>
  </channel>
</rss>

