<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Regex on a WMI security and Splunk formating in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98801#M25468</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I want to filter out all Successful NULL user logins from the Windows Security logs by using transforms.conf to send to the nullQueue before indexing. &lt;/P&gt;

&lt;P&gt;In the Search app, the lines are displayed as:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;  ...
  Type=Audit Success
  User=NULL    
  ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But I am not sure how to create the regex to handle both lines even though the lines come after one another. All the regex testers I have tried have not been helpful.&lt;/P&gt;</description>
    <pubDate>Tue, 10 May 2011 16:25:02 GMT</pubDate>
    <dc:creator>jordans</dc:creator>
    <dc:date>2011-05-10T16:25:02Z</dc:date>
    <item>
      <title>Regex on a WMI security and Splunk formating</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98801#M25468</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I want to filter out all Successful NULL user logins from the Windows Security logs by using transforms.conf to send to the nullQueue before indexing. &lt;/P&gt;

&lt;P&gt;In the Search app, the lines are displayed as:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;  ...
  Type=Audit Success
  User=NULL    
  ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But I am not sure how to create the regex to handle both lines even though the lines come after one another. All the regex testers I have tried have not been helpful.&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2011 16:25:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98801#M25468</guid>
      <dc:creator>jordans</dc:creator>
      <dc:date>2011-05-10T16:25:02Z</dc:date>
    </item>
    <item>
      <title>Re: Regex on a WMI security and Splunk formating</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98802#M25469</link>
      <description>&lt;P&gt;By default, Splunk should extract those fields with it's automatic field extraction.   For any key=value, Splunk is pretty friendly.   To optimize a search that finds all of these:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Make sure "Type" and "User" get extracted.  you may need to turn on field discovery and pick them from the field picker&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Assuming each event contains both of these lines, here is the search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Audit Success NULL | search User=NULL Type="Audit Success"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;OR&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;User=NULL Type="Audit Success"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;To filter these events from your results, you want to negate the terms:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;NOT User=NULL NOT Type="Audit Success"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 10 May 2011 17:44:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98802#M25469</guid>
      <dc:creator>Simeon</dc:creator>
      <dc:date>2011-05-10T17:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: Regex on a WMI security and Splunk formating</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98803#M25470</link>
      <description>&lt;P&gt;I'm afraid I was not clear. I want to filter them out before indexing, so I need to configure transforms.conf. That's the regex I need to figure out.&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2011 20:17:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98803#M25470</guid>
      <dc:creator>jordans</dc:creator>
      <dc:date>2011-05-10T20:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: Regex on a WMI security and Splunk formating</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98804#M25471</link>
      <description>&lt;P&gt;Sounds like you want to do conditional routing to the nullqueue for specific events.   The following thread explains how to route to nullqueue (won't get indexed).  You want to modify the regex to recognize your specific events:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://splunk-base.splunk.com/answers/11102/can-i-devnull-a-sourcetype"&gt;http://splunk-base.splunk.com/answers/11102/can-i-devnull-a-sourcetype&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2011 21:30:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98804#M25471</guid>
      <dc:creator>Simeon</dc:creator>
      <dc:date>2011-05-10T21:30:13Z</dc:date>
    </item>
    <item>
      <title>Re: Regex on a WMI security and Splunk formating</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98805#M25472</link>
      <description>&lt;P&gt;But that's my whole point. I need to know what the regex is ...&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2011 22:01:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98805#M25472</guid>
      <dc:creator>jordans</dc:creator>
      <dc:date>2011-05-10T22:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: Regex on a WMI security and Splunk formating</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98806#M25473</link>
      <description>&lt;P&gt;I ended up figuring it out eventually, with some added features:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(?m)Type=Audit\sSuccess(\s+.*\s+){6}Account\sName:\s+(USERNAME1|USERNAME2)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 10 May 2011 22:58:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-on-a-WMI-security-and-Splunk-formating/m-p/98806#M25473</guid>
      <dc:creator>jordans</dc:creator>
      <dc:date>2011-05-10T22:58:10Z</dc:date>
    </item>
  </channel>
</rss>

