Hi, i just installed Graylog. Everything is fine, but… i have to much logs
Please, help me with filtering.
I have stream accepting windows event logs - gelf.
I am monitoring for example EventID : 4624 (log in). But this event generates not only logs from people but from server or system. A want to delete this message. So i created pipeline and apply to that stream:
Problem is, that i am still receiving unwanted messages as below. Am i doing something wrong?
Thanks
Lucas
rule “Drop unnecessary messages”
when
has_field(“TargetUserName”) AND
(
contains(to_string($message.TargetUserName),“ABRA”) OR
contains(to_string($message.TargetUserName),“DWM”) OR
contains(to_string($message.TargetUserName),“SYSTEM”)
)
then
drop_message();
end
ALLERT CONFIGURATION:
Source : {message.fields.source}
TargetUserName : {message.fields.TargetUserName}
EventID : {message.fields.EventID}
IpAddress : {message.fields.IpAddress}
Channel : {message.fields.Channel}
Category : {message.fields.Category}
Severity : {message.fields.Severity}
Message : {message.fields.message}
RESULT IN MAIL:
as you can see, there is ABRA what should be deleted
Source : abra.codya.local
TargetUserName : ABRA$
EventID : 4624
IpAddress : ::1
Channel : Security
Category : Logon
Severity : INFO
Message : An account was successfully logged on.
Subject:
Security ID
