Hi all,
I have a rule in Syslog NG that searches for forwarded Windows Event Logs with a specific Event ID.
The MessageText field is configured to match MSWinEventLog\t[0-4]\tSecurity\t\d{1,10}?\t.{24}\t4662\t.*
The rule works, but it isn't catching all relevant events.
We also log everything to a database and I can find numerous other 4662 events in the database that aren't being caught by this rule. I have even taken events in the database which were missed by this rule and tested them against the rule (e.g. regex101.com) and they do match the rule.
So my guess is that the regex rule is taking too long in real-time to evaluate every incoming log and ends up missing some. Just a guess, though.
Has anyone else had issues like this? If so, how have you resolved it?
Any help is appreciated.
Regards,
Eric