Getting Data In

Transforms/props event filtering

danilom
Explorer

Hello,
I would like to sent to nullQueue some windows security events based on some regex. So I have defined:

props.conf

[WinEventLog:Security]
TRANSFORMS-set= setnull,pruneprocesses,pruneusers,prunemachines,setparsing

transforms.conf

[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[pruneprocesses]
REGEX = Process\s+Name:\s*.*?(svchost.exe|lsass.exe) 
DEST_KEY= queue
FORMAT = nullQueue

[pruneusers]
REGEX = Account\s+Name:\s*.*?(-|SYSTEM) 
DEST_KEY= queue
FORMAT = nullQueue

[prunemachines]
REGEX = Account\s+Name:\s+[A-Z0-9-]+[\$]
DEST_KEY= queue
FORMAT = nullQueue

[setparsing]
REGEX = (?msi)^EventCode=(4624|4625|4634|4656|4659|4660)\D
DEST_KEY = queue
FORMAT = indexQueue

But, obviously, the events that matches one of the pruneusers, pruneusers or prunemachines AND matches the setparsing are indexed, while I would like that if an event matches one of the "prune" rules the event itself must NOT be indexed ... how can I do that?

Thank in advance

0 Karma
1 Solution

lukejadamec
Super Champion

Have you tried putting setparsing after setnull and before prune...?

View solution in original post

danilom
Explorer

Correct! ... now I have understood how props/transforms work.

Thank!

0 Karma

lukejadamec
Super Champion

Have you tried putting setparsing after setnull and before prune...?

Get Updates on the Splunk Community!

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...