Hello all, I've configured winlogbeat to collect events from one of our domain controllers, there is a particular service account that generates thousands of successful authentication events each day and we're not interested in collecting those events. I therefore tried to create a filter that would drop those event IDs with that particular account as the target username (we'll call the account 'test-user' in this example). Here is the processor filter I added to the winlogbeat.yml file:
I thought it may have to be done they way you've specified - can you elaborate on the 'and:' and 'or:' order as it confuses me the way its written - in mind when I read your example the 'and:' is associated with equals.event_id: and the 'or:' is associated with equals.event_data.TargetUserName:
Do the hyphens associate the condition with the field?
If you are familiar with prefix notation you might recognize the pattern used here. The operators are written before the operands.
So the outer most operator is AND so it goes first. The expressions that are being AND'ed are next. These are the OR expression and the TargetUserName expression.
AND
(OR 4624 4625 4634 4648)
(test-user)
The other thing to understand is that the configuration is YAML and that is where the hyphens and indentation are coming from. Maybe showing the equivalent representation in JSON will make more sense (assuming some familiarity with JSON). BTW the following is also valid config as YAML is superset of JSON.
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.