<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: REGEX problem transforms.conf WinEventLog:Security in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29358#M5922</link>
    <description>&lt;P&gt;Try one at a time - then try and expand it, also I notice you have spaces in your regex? &lt;/P&gt;

&lt;P&gt;If you need 2 then do something like this:&lt;BR /&gt;
props.conf:&lt;BR /&gt;
TRANSFORMS-set = setnullevents1,setnullevents2&lt;/P&gt;

&lt;P&gt;and then transforms.conf:&lt;/P&gt;

&lt;P&gt;[setnullevents1]&lt;BR /&gt;
blah&lt;/P&gt;

&lt;P&gt;[setnullevents2]&lt;BR /&gt;
blah&lt;/P&gt;

&lt;P&gt;From our working one to filter out specific hosts and events:&lt;/P&gt;

&lt;P&gt;[setnullevents]&lt;BR /&gt;
REGEX = (?ms)(EventCode=(17503|6105|6107|6106|6201)\D).*(ComputerName=(COMP-001|COMP-002|COMP-003))&lt;/P&gt;

&lt;P&gt;DEST_KEY = queue&lt;/P&gt;

&lt;P&gt;FORMAT = nullQueue&lt;/P&gt;</description>
    <pubDate>Fri, 23 Sep 2011 13:02:35 GMT</pubDate>
    <dc:creator>matthewhaswell</dc:creator>
    <dc:date>2011-09-23T13:02:35Z</dc:date>
    <item>
      <title>REGEX problem transforms.conf WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29347#M5911</link>
      <description>&lt;P&gt;Hey, Im having problems with my REGEX expression, Im trying to filter out the following&lt;/P&gt;

&lt;P&gt;If an event has Type = Success Audit OR [Type = Information AND Keywords = Audit Success]&lt;/P&gt;

&lt;P&gt;The below event should get filtered out:&lt;/P&gt;

&lt;P&gt;**&lt;STRONG&gt;&lt;EM&gt;06/16/11 03:32:33 PMLogName=SecuritySourceName=Microsoft Windows security auditing.EventCode=5156EventType=0Type=InformationComputerName=DBPP-AD1-08.UOMS.IETaskCategory=Filtering Platform ConnectionOpCode=InfoRecordNumber=403184238&lt;BR /&gt;
Show all 30 lines&lt;BR /&gt;
host=DBPP-AD1-08   Options|  sourcetype=WinEventLog:Security   Options|  source=WinEventLog:Security   Options|  Keywords=Audit Success   Options|  Type=Information   Options&lt;/EM&gt;&lt;/STRONG&gt;**&lt;/P&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;P&gt;[nullFilter]&lt;/P&gt;

&lt;P&gt;REGEX = (?m)^(Type= Success Audit) | (Type = information &amp;amp;&amp;amp; Keywords = Success Audit)&lt;/P&gt;

&lt;P&gt;DEST_KEY = queue&lt;/P&gt;

&lt;P&gt;FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;Thanks for the help!**&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2011 14:56:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29347#M5911</guid>
      <dc:creator>nrelihan</dc:creator>
      <dc:date>2011-06-16T14:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX problem transforms.conf WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29348#M5912</link>
      <description>&lt;P&gt;You may want to try:&lt;BR /&gt;
REGEX = (?m)^(Type=Success\sAudit)|(Keywords=Audit\sSuccess.*Type=Information\sOptions)&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2011 15:51:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29348#M5912</guid>
      <dc:creator>dshpritz</dc:creator>
      <dc:date>2011-06-16T15:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX problem transforms.conf WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29349#M5913</link>
      <description>&lt;P&gt;Thanks dshpritz, but I still get all these types in new searches of sourcetype="WinEventLog:Security"&lt;BR /&gt;
I restarted the splunk after editing the transforms.conf.&lt;BR /&gt;
Here is my props.conf:&lt;/P&gt;

&lt;P&gt;[source::WinEventLog:Security]&lt;/P&gt;

&lt;P&gt;TRANSFORMS-nullQ= nullFilter&lt;/P&gt;

&lt;P&gt;Iv added an event below that came in after the modification.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2011 16:19:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29349#M5913</guid>
      <dc:creator>nrelihan</dc:creator>
      <dc:date>2011-06-16T16:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX problem transforms.conf WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29350#M5914</link>
      <description>&lt;P&gt;auditing.EventCode=5156EventType=0Type=InformationComputerName=DBPP-AD1-08.UOMS.IETaskCategory=Filtering Platform ConnectionOpCode=InfoRecordNumber=403243973Keywords=Audit SuccessMessage=The Windows Filtering Platform has permitted a connection.Application Information: Process ID: 780 Application Name: \device\harddiskvolume2\windows\system32\svchost.exeNetwork Information: Direction: Inbound Source Address: 10.10.10.1 Source Port: 135 Destination Address: 10.10.12.184 Destination Port: 2562 Protocol: 6Filter Information: Filter Run-Time ID: 0 Layer Name: Receive/Accept Layer Run-Time ID: 44&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2011 16:19:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29350#M5914</guid>
      <dc:creator>nrelihan</dc:creator>
      <dc:date>2011-06-16T16:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX problem transforms.conf WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29351#M5915</link>
      <description>&lt;P&gt;if you take out the "(?m)^" at the start of the regex, does that help?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2011 16:30:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29351#M5915</guid>
      <dc:creator>dshpritz</dc:creator>
      <dc:date>2011-06-16T16:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX problem transforms.conf WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29352#M5916</link>
      <description>&lt;P&gt;I tried taking it out, but still nothing, everything seems to get though...&lt;/P&gt;

&lt;P&gt;Its very strange, Here the directory I have the two files in.. any reason why you think its failing to capture?&lt;/P&gt;

&lt;P&gt;uoms@DBPP-Splunk:/opt/splunk/etc/system/local$ ls -la&lt;/P&gt;

&lt;P&gt;-rwxrwxr-x 1 splunk splunk 18665 2011-06-13 17:15 props.conf&lt;/P&gt;

&lt;P&gt;-rwxrwxr-x 1 splunk splunk 10793 2011-06-16 17:35 transforms.conf&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2011 16:41:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29352#M5916</guid>
      <dc:creator>nrelihan</dc:creator>
      <dc:date>2011-06-16T16:41:23Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX problem transforms.conf WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29353#M5917</link>
      <description>&lt;P&gt;You can change the regex to something which will always capture (like (.*)) to make sure Splunk is picking up the transform.&lt;/P&gt;

&lt;P&gt;Also, is the event displaying correctly on the Answers site (with line breaks, etc)?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2011 16:50:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29353#M5917</guid>
      <dc:creator>dshpritz</dc:creator>
      <dc:date>2011-06-16T16:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX problem transforms.conf WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29354#M5918</link>
      <description>&lt;P&gt;I tried putting in (.*) as you suggested so I can see the transform is working, as I see nothing coming in.&lt;BR /&gt;
No the events arent displaying correctly here which is a bit annoying, it seems to ignore the line breaks. Ill try to print what its like on splunk web with spaces inbetween lines&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2011 17:03:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29354#M5918</guid>
      <dc:creator>nrelihan</dc:creator>
      <dc:date>2011-06-16T17:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX problem transforms.conf WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29355#M5919</link>
      <description>&lt;P&gt;06/16/11 05:52:59 PM&lt;/P&gt;

&lt;P&gt;LogName=Security&lt;/P&gt;

&lt;P&gt;SourceName=Microsoft Windows security auditing.&lt;/P&gt;

&lt;P&gt;EventCode=5145&lt;/P&gt;

&lt;P&gt;EventType=0&lt;/P&gt;

&lt;P&gt;Type=Information&lt;/P&gt;

&lt;P&gt;ComputerName=DBPP-AD1-08.UOMS.IE&lt;/P&gt;

&lt;P&gt;TaskCategory=Detailed File Share&lt;/P&gt;

&lt;P&gt;OpCode=Info&lt;/P&gt;

&lt;P&gt;RecordNumber=403262630&lt;/P&gt;

&lt;P&gt;Keywords=Audit Success&lt;/P&gt;

&lt;P&gt;Message=A network share object was checked to see whether client can be granted desired access.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2011 17:05:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29355#M5919</guid>
      <dc:creator>nrelihan</dc:creator>
      <dc:date>2011-06-16T17:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX problem transforms.conf WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29356#M5920</link>
      <description>&lt;P&gt;There was a comment which came through email, but not displayed here which showed the event data. Another regex to try:&lt;/P&gt;

&lt;P&gt;Type=Information\n(.*\n)*Keywords=Audit\sSuccess|Type=Success\sAudit&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2011 17:51:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29356#M5920</guid>
      <dc:creator>dshpritz</dc:creator>
      <dc:date>2011-06-16T17:51:47Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX problem transforms.conf WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29357#M5921</link>
      <description>&lt;P&gt;Posted this yesterday, but it didn't seem to take. Based on the event shown in the email I got, here is another regex to try:&lt;BR /&gt;
Type=Information\n(.*\n)+Keywords=Audit\sSuccess|Type=Success\sAudit&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2011 14:19:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29357#M5921</guid>
      <dc:creator>dshpritz</dc:creator>
      <dc:date>2011-06-17T14:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX problem transforms.conf WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29358#M5922</link>
      <description>&lt;P&gt;Try one at a time - then try and expand it, also I notice you have spaces in your regex? &lt;/P&gt;

&lt;P&gt;If you need 2 then do something like this:&lt;BR /&gt;
props.conf:&lt;BR /&gt;
TRANSFORMS-set = setnullevents1,setnullevents2&lt;/P&gt;

&lt;P&gt;and then transforms.conf:&lt;/P&gt;

&lt;P&gt;[setnullevents1]&lt;BR /&gt;
blah&lt;/P&gt;

&lt;P&gt;[setnullevents2]&lt;BR /&gt;
blah&lt;/P&gt;

&lt;P&gt;From our working one to filter out specific hosts and events:&lt;/P&gt;

&lt;P&gt;[setnullevents]&lt;BR /&gt;
REGEX = (?ms)(EventCode=(17503|6105|6107|6106|6201)\D).*(ComputerName=(COMP-001|COMP-002|COMP-003))&lt;/P&gt;

&lt;P&gt;DEST_KEY = queue&lt;/P&gt;

&lt;P&gt;FORMAT = nullQueue&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2011 13:02:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/REGEX-problem-transforms-conf-WinEventLog-Security/m-p/29358#M5922</guid>
      <dc:creator>matthewhaswell</dc:creator>
      <dc:date>2011-09-23T13:02:35Z</dc:date>
    </item>
  </channel>
</rss>

