Hi there,
Hope everyone is doing fine.
So i have an issue and i can´t get it to work.
At some time in my Active Directory, network administrator add an user for management and secuirty, and the this user is creating many windows events that i don´t need to in the graylog.
I just need to graylog to stop processing the events from that especified user, but i can get it to work.
I use a stream for Audit Events from the Domain Controllers and the rules are simple for only that sources.
I tried, change the config in the Winlogbeat but i thing i missing something.
Tried Pipelines with the “winlogbeat.event_data_TargetUserName equals “username””
Tried add new role to stream but no luck since i don´t have “or” or “and” to chose.
Whats is best solution?
Thank you
And Best Regards.
Luís Costa
You can use Winlogbeat processing to drop the event based username (Start Research Here)
Or if you post your (genericised and nicely formatted with the forum tools) pipeline code for dropping the messages maybe we could help with a little more detail.
Great! The indentation thing catches people a LOT - I had not used processors in winlogbeat either so it’s good to know that contains: works. It’s definitely better to stop the heavy volume before it gets to Graylog - be sure to narrow the scope enough so you don’t miss any important events that sa-network-adm gets into…
for the pipeline (had you done it that way) it would be simpler to put:
So did some changes and works better within the “name” of the log.`
Also notice that some of the events will passtruth because the username field in the event was null.
After some research the following code work just fine and no events pass so far: