Hello all, I've configured winlogbeat to collect events from one of our domain controllers, there is a particular service account that generates thousands of successful authentication events each day and we're not interested in collecting those events. I therefore tried to create a filter that would drop those event IDs with that particular account as the target username (we'll call the account 'test-user' in this example). Here is the processor filter I added to the winlogbeat.yml file:
processors:
- drop_event:
when:
equals:
event_id: 4624
and:
- equals:
event_data.TargetUserName: test-user
- drop_event:
when:
equals:
event_id: 4634
and:
- equals:
event_data.TargetUserName: test-user
- drop_event:
when:
equals:
event_id: 4625
and:
- equals:
event_data.TargetUserName: test-user
- drop_event:
when:
equals:
event_id: 4648
and:
- equals:
event_data.TargetUserName: test-user
However, when I run a query for those event IDs it appears that they've all been dropped, not just the ones with the 'test-user' in the message.
Can anyone help?