I have Windows event logs that I am parsing. Here is an example:
I have lots of preprocessing to help me filter out the events that I don't want but this last one is giving me issues.
Here is my regex:
At regex101, this works and locates the second Account Name, if its ends in a dollar sign ($), it will match. However, using this exact same event log and regex in preprocessing, I get string doesn't match.
I must be doing something wrong. Can anyone make a suggestion?
Thank you.
Code:
An account was successfully logged on.
Subject:
Security ID: NULL SID
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 3
Impersonation Level: Impersonation
New Logon:
Security ID: NT AUTHORITY\SYSTEM
Account Name: SERVER1$
Account Domain: COMPANY
Logon ID: 0x197E15406
Logon GUID: {D9DF285C-B46D-0987-8FEB-96A1AB955525}
Process Information:
Process ID: 0x0
Process Name: -
Network Information:
Workstation Name: -
Source Network Address: 127.0.0.1
Source Port: 5747
Detailed Authentication Information:
Logon Process: Kerberos
Authentication Package: Kerberos
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
Here is my regex:
Code:
Account Name:(.*\$)$
I must be doing something wrong. Can anyone make a suggestion?
Thank you.
you said, regex found the second Account Name, the one with $ in the end..
.*\$)$" also works and returns just one match, the second "Account Name", but not in zabbix...
Comment