Getting Data In

Transforms/props event filtering

danilom
Explorer

Hello,
I would like to sent to nullQueue some windows security events based on some regex. So I have defined:

props.conf

[WinEventLog:Security]
TRANSFORMS-set= setnull,pruneprocesses,pruneusers,prunemachines,setparsing

transforms.conf

[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[pruneprocesses]
REGEX = Process\s+Name:\s*.*?(svchost.exe|lsass.exe) 
DEST_KEY= queue
FORMAT = nullQueue

[pruneusers]
REGEX = Account\s+Name:\s*.*?(-|SYSTEM) 
DEST_KEY= queue
FORMAT = nullQueue

[prunemachines]
REGEX = Account\s+Name:\s+[A-Z0-9-]+[\$]
DEST_KEY= queue
FORMAT = nullQueue

[setparsing]
REGEX = (?msi)^EventCode=(4624|4625|4634|4656|4659|4660)\D
DEST_KEY = queue
FORMAT = indexQueue

But, obviously, the events that matches one of the pruneusers, pruneusers or prunemachines AND matches the setparsing are indexed, while I would like that if an event matches one of the "prune" rules the event itself must NOT be indexed ... how can I do that?

Thank in advance

0 Karma
1 Solution

lukejadamec
Super Champion

Have you tried putting setparsing after setnull and before prune...?

View solution in original post

danilom
Explorer

Correct! ... now I have understood how props/transforms work.

Thank!

0 Karma

lukejadamec
Super Champion

Have you tried putting setparsing after setnull and before prune...?

Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...