I am trying to exclude a specific field containing a "$" sign, but am having very little luck.
Basically trying to audit logon events for windows machines. (from winlogbeats 5 alpha)
My query is
event_id:(4778 OR 4801 OR 4803 OR 4624 ) AND NOT event_data.TargetUserName.raw:(.)$
event_id:(4778 OR 4801 OR 4803 OR 4624 ) AND NOT event_data.TargetUserName.raw:/(.)$/
event_id:(4778 OR 4801 OR 4803 OR 4624 ) AND NOT event_data.TargetUserName.raw:/(.$)/
event_id:(4778 OR 4801 OR 4803 OR 4624 ) AND NOT event_data.TargetUserName.raw:/(.)/$
event_id:(4778 OR 4801 OR 4803 OR 4624 ) AND NOT event_data.TargetUserName.raw:/$$/
I created some test data for this case and also had a very hard time finding (or excluding) fields that ended in "$". The problem was that although I created my index with;
I think this is the template that would be used (if you ran the absolute newest version of winlogbeat). I'll pass this thread on to the Beats team to see if they see a problem.
Could you please let us know what versions of Elasticsearch, Kibana, and Winlogbeat you're running?
And could you also please go to the Settings (Management) tab, select this index pattern, and find the field event_data.TargetUserName.raw and tell us if Analyzed is checked for it?
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.