Hello,
I have some Windows logs that I would like to drop at the forwarder before they are ingested into the SIEM using the regex functionality documented here https://cloud.google.com/chronicle/docs/install/forwarder-linux#set_regular_expression_filters
For the particular event ID that I am filtering I only want to match raw logs that include the C$, IPC$, or ADMIN$ shares and drop everything else. The problem that I am running into is that negative lookaheads are the go-to way to do something like this with regex, for example...
(?!C|IPC|ADMIN)
...which apparently are not supported here. If I understand the documentation correctly I also cannot use a capture group in a filter set to "allow" what I want and then a subsequent filter to "block" everything else since the "block" takes precedence over the "allow" and would block everything.
Is there some other way to selectively ingest raw logs on a forwarder, with or without regex, that I am overlooking?
