Splunk Search

Regex not finding what I'm looking for???

Path Finder

I have this event and I'm trying to send it to the nullQueue if it contains SYSTEM.

2013-10-24 15:02:34,Major,REMOVED,Allowed, - Caller MD5=61b1dfb9703d0d678e108e0156fcbb69,Create Process,Begin: 2013-10-24 15:02:20,End: 2013-10-24 15:02:20,Rule: This one is a splat | Watch these Executables,1504,C:/Program Files/VMware/VMware Tools/vmtoolsd.exe,0,No Module Name,C:/Windows/System32/net.exe,User: SYSTEM,Domain: WORKGROUP,Action Type:

source = D:\Program Files\Symantec\Symantec Endpoint Protection Manager\data\dump\agt_behavior.tmp
sourcetype = sep_behavior

My props.conf is set to this:

And my transforms.conf is set to this:

Exclude sep:behavior system events

DEST_KEY = queue
FORMAT = nullQueue

Tags (1)
0 Karma

Super Champion

Your regex does not look right.

You can try this:


Or this if User is a field:

Get Updates on the Splunk Community!

Optimize Cloud Monitoring

  TECH TALKS Optimize Cloud Monitoring Tuesday, August 13, 2024  |  11:00AM–12:00PM PST   Register to ...

What's New in Splunk Cloud Platform 9.2.2403?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.2.2403! Analysts can ...

Stay Connected: Your Guide to July and August Tech Talks, Office Hours, and Webinars!

Dive into our sizzling summer lineup for July and August Community Office Hours and Tech Talks. Scroll down to ...