<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to keep only certain users events from Windows event log security? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307298#M92197</link>
    <description>&lt;P&gt;Hello,&lt;BR /&gt;
I would like to filter, at the indexers, events coming from WinEventLog:Security to keep only certain users .&lt;BR /&gt;
The problem is that the list of users is really huge and contains, more or less, 1200 entries. The customer I am working for has set up a REGEX with 1199 pipes(!) for 1200 entries.&lt;BR /&gt;
A little sample of what is inside the transforms.conf file is: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;REGEX = (?i)(A111111)|(A111112)|(A111118)... and so on with 1199 pipes
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The final result is that the indexers (2 with 12 cores and 12 GB of RAM) become unresponsive, there is huge indexing lag and a lot of broken pipe connections from Windows Universal Forwarders.&lt;BR /&gt;
How can I keep, in a better way, only those users' events?&lt;/P&gt;

&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Wed, 29 Nov 2017 14:14:31 GMT</pubDate>
    <dc:creator>cafissimo</dc:creator>
    <dc:date>2017-11-29T14:14:31Z</dc:date>
    <item>
      <title>How to keep only certain users events from Windows event log security?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307298#M92197</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;
I would like to filter, at the indexers, events coming from WinEventLog:Security to keep only certain users .&lt;BR /&gt;
The problem is that the list of users is really huge and contains, more or less, 1200 entries. The customer I am working for has set up a REGEX with 1199 pipes(!) for 1200 entries.&lt;BR /&gt;
A little sample of what is inside the transforms.conf file is: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;REGEX = (?i)(A111111)|(A111112)|(A111118)... and so on with 1199 pipes
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The final result is that the indexers (2 with 12 cores and 12 GB of RAM) become unresponsive, there is huge indexing lag and a lot of broken pipe connections from Windows Universal Forwarders.&lt;BR /&gt;
How can I keep, in a better way, only those users' events?&lt;/P&gt;

&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 14:14:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307298#M92197</guid>
      <dc:creator>cafissimo</dc:creator>
      <dc:date>2017-11-29T14:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to keep only certain users events from Windows event log security?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307299#M92198</link>
      <description>&lt;P&gt;Hi @cafissimo,&lt;/P&gt;

&lt;P&gt;Have you tried with filtering those Users on forwarder instead of at Indexer. Please refer &lt;A href="http://docs.splunk.com/Documentation/SplunkCloud/6.6.3/Data/MonitorWindowseventlogdata"&gt;http://docs.splunk.com/Documentation/SplunkCloud/6.6.3/Data/MonitorWindowseventlogdata&lt;/A&gt; and search for &lt;STRONG&gt;Create advanced filters with 'whitelist' and 'blacklist'&lt;/STRONG&gt;, I have tried this config with SourceName and it is working fine but with small number of SourceName. And I am not sure how Splunkforwarder behaves with 1200 User filtering and also if you want to configure Username explicitly then approach which I have provided will not work because you need to add 1200 whitelist.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 14:28:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307299#M92198</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2017-11-29T14:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to keep only certain users events from Windows event log security?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307300#M92199</link>
      <description>&lt;P&gt;Hi cafissimo,&lt;BR /&gt;
I think that probably you riched the limit of the lenght of a regex and there a very higl overload on the Indexers caused by the regex!&lt;BR /&gt;
In addition this solution isn't well manageable because for every update you have to restart all your Splunk indexers!&lt;/P&gt;

&lt;P&gt;Did you checked what's the difference (in license use) indexing events for all the users or if the not interesting users are less that the interesting ones?&lt;BR /&gt;
maybe there a little difference!&lt;/P&gt;

&lt;P&gt;In addition: are you sure that you need all the Windows EventCodes, maybe not indexing some events you reach the same goal of users reducing.&lt;/P&gt;

&lt;P&gt;Anyway, to semplificate you regex, you should try to identify some common username parts (e.g.: A111) so you could limit the regex lenght, but not the work for the Indexers!&lt;/P&gt;

&lt;P&gt;I hope to be useful.&lt;/P&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 14:30:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307300#M92199</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-11-29T14:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to keep only certain users events from Windows event log security?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307301#M92200</link>
      <description>&lt;P&gt;I have tried whitelisting @ forwarder side for Windows Event Codes (the most typical are 4624, 4625, 4634, ...) but never tried with a so big list and since I am working in a production environment with Domain Controllers I cannot make such test.&lt;BR /&gt;
I need a proven solution.&lt;BR /&gt;
Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 14:33:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307301#M92200</guid>
      <dc:creator>cafissimo</dc:creator>
      <dc:date>2017-11-29T14:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to keep only certain users events from Windows event log security?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307302#M92201</link>
      <description>&lt;P&gt;I was thinking about writing a python or AWK program to optimize the REGEX, but it's not that simple in my scenario.&lt;BR /&gt;
I am working in a PCI environment and the customer prefers to index "more" data than needed.&lt;BR /&gt;
For the time being I have ended up writing a short REGEX that keeps all users beginning with "X" followed by 6 chars.&lt;BR /&gt;
I was just wondering if anyone has ever faced a similar situation.&lt;BR /&gt;
Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 14:36:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307302#M92201</guid>
      <dc:creator>cafissimo</dc:creator>
      <dc:date>2017-11-29T14:36:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to keep only certain users events from Windows event log security?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307303#M92202</link>
      <description>&lt;P&gt;Hi cafissimo,I think that, if you can, the best way is to index all users (eventually reducing EventCodes) and then filter them in search, using a lookup.&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 14:52:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307303#M92202</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-11-29T14:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to keep only certain users events from Windows event log security?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307304#M92203</link>
      <description>&lt;P&gt;Yes, I know it and I agree with you, but I should change some correlation searches in Splunk App for PCI Compliance.&lt;BR /&gt;
Other than this I'll have to check next days if indexing volume is not increasing too much.&lt;BR /&gt;
Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 14:57:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307304#M92203</guid>
      <dc:creator>cafissimo</dc:creator>
      <dc:date>2017-11-29T14:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to keep only certain users events from Windows event log security?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307305#M92204</link>
      <description>&lt;P&gt;If all the usernames start with an "A" and then have 6 numbers you can use this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;([aA][0-9]{6})
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;if you just want A111111 to A112311 you can use:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;([aA]11[12][0-9]{3})
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 07 Dec 2017 08:26:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-keep-only-certain-users-events-from-Windows-event-log/m-p/307305#M92204</guid>
      <dc:creator>aholzel</dc:creator>
      <dc:date>2017-12-07T08:26:57Z</dc:date>
    </item>
  </channel>
</rss>

