Greetings,
I've been playing with the new v3.4 item preprocessing function.
I'm trying to extract some specific details from collected Windows event logs, like: https://docs.microsoft.com/en-us/win...ing/event-4625
Example of a section I would like to extract into the "Dependent item":Please note, that there are several occurrences in the log of these details: "Security ID", "Account Name", "Account Domain".
Normally a PCRE regexp like "(?m)Account For Which Logon Failed
\n\n.*\n\n.*\n\n.*)" would be enough.
But I'm still a little bit confused, about how to convert this PCRE into ZBX item preprocessing regexp?
Thank you in advance.
I've been playing with the new v3.4 item preprocessing function.
I'm trying to extract some specific details from collected Windows event logs, like: https://docs.microsoft.com/en-us/win...ing/event-4625
Example of a section I would like to extract into the "Dependent item":
Account For Which Logon Failed:
Security ID: S-1-0-0
Account Name: WORKSTATION$
Account Domain: DOMAIN
Account Name: WORKSTATION$
Account Domain: DOMAIN
Normally a PCRE regexp like "(?m)Account For Which Logon Failed
\n\n.*\n\n.*\n\n.*)" would be enough.But I'm still a little bit confused, about how to convert this PCRE into ZBX item preprocessing regexp?
Thank you in advance.
Comment