Getting Data In

Transforms/props event filtering

danilom
Explorer

Hello,
I would like to sent to nullQueue some windows security events based on some regex. So I have defined:

props.conf

[WinEventLog:Security]
TRANSFORMS-set= setnull,pruneprocesses,pruneusers,prunemachines,setparsing

transforms.conf

[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[pruneprocesses]
REGEX = Process\s+Name:\s*.*?(svchost.exe|lsass.exe) 
DEST_KEY= queue
FORMAT = nullQueue

[pruneusers]
REGEX = Account\s+Name:\s*.*?(-|SYSTEM) 
DEST_KEY= queue
FORMAT = nullQueue

[prunemachines]
REGEX = Account\s+Name:\s+[A-Z0-9-]+[\$]
DEST_KEY= queue
FORMAT = nullQueue

[setparsing]
REGEX = (?msi)^EventCode=(4624|4625|4634|4656|4659|4660)\D
DEST_KEY = queue
FORMAT = indexQueue

But, obviously, the events that matches one of the pruneusers, pruneusers or prunemachines AND matches the setparsing are indexed, while I would like that if an event matches one of the "prune" rules the event itself must NOT be indexed ... how can I do that?

Thank in advance

0 Karma
1 Solution

lukejadamec
Super Champion

Have you tried putting setparsing after setnull and before prune...?

View solution in original post

danilom
Explorer

Correct! ... now I have understood how props/transforms work.

Thank!

0 Karma

lukejadamec
Super Champion

Have you tried putting setparsing after setnull and before prune...?

Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...