<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Splunk Add-on for MIcrosoft SQL Server and DB Connect 2: How to extract and index mssql:audit &amp;quot;additional information&amp;quot; field? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-MIcrosoft-SQL-Server-and-DB-Connect-2-How-to/m-p/274724#M32070</link>
    <description>&lt;P&gt;We're polling an audit file from our SQL server, that includes a field called &lt;STRONG&gt;additional information.&lt;/STRONG&gt; This field has a field inside it: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;address&amp;gt;field&amp;lt;/address&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;that I need to be indexed. I may have done something wrong in setting up the input, because I kind of expected this to be an indexed field from the beginning.&lt;/P&gt;

&lt;P&gt;This is the input:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[mi_input://mssql:audit]
connection = SQLServer
index = main
interval = 60
max_rows = 10000
mode = tail
output_timestamp_format = YYYY-MM-dd HH:mm:ss
query = SELECT * FROM sys.fn_get_audit_file ('M:\\\\AuditFiles\\\\*',default,default)
source = dbx2
sourcetype = mssql:audit
tail_follow_only = 1
tail_rising_column_name = event_time
tail_rising_column_number = 1
ui_query_mode = advanced
disabled = 0
tail_rising_column_checkpoint_value = 1449605957973`
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and this is the result:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;"2015-12-08 11:15:19" event_time=1449609223316, sequence_number=1, action_id="LGIS", succeeded=1, permission_bitmask=## NOT SUPPORTED TYPE ##, is_column_permission=0, session_id=65, server_principal_id=274, database_principal_id=0, target_server_principal_id=0, target_database_principal_id=0, object_id=0, class_type="LX", session_server_principal_name="xxxx\svcSQLxxxx", server_principal_name="xxxx\svcSQLxxxx", server_principal_sid=## NOT SUPPORTED TYPE ##, target_server_principal_sid=## NOT SUPPORTED TYPE ##, server_instance_name="xxxxxxxxxx", statement="-- network protocol: LPC
set quoted_identifier on
set arithabort off
set numeric_roundabort off
set ansi_warnings on
set ansi_padding on
set ansi_nulls on
set concat_null_yields_null on
set cursor_close_on_commit off
set implicit_transactions off
set language us_english
set dateformat mdy
set datefirst 7
set transaction isolation level read committed", additional_information="&amp;lt;action_info xmlns="http://schemas.microsoft.com/sqlserver/2008/sqlaudit_data"&amp;gt;&amp;lt;pooled_connection&amp;gt;1&amp;lt;/pooled_connection&amp;gt;&amp;lt;client_options&amp;gt;0x28000020&amp;lt;/client_options&amp;gt;&amp;lt;client_options1&amp;gt;0x0001f438&amp;lt;/client_options1&amp;gt;&amp;lt;connect_options&amp;gt;0x00000000&amp;lt;/connect_options&amp;gt;&amp;lt;packet_data_size&amp;gt;8000&amp;lt;/packet_data_size&amp;gt;&amp;lt;address&amp;gt;local machine&amp;lt;/address&amp;gt;&amp;lt;is_dac&amp;gt;0&amp;lt;/is_dac&amp;gt;&amp;lt;/action_info&amp;gt;", file_name="M:\AuditFiles\Audit_Logins_Fail_Success_Log_42C90784-3268-445A-94B3-4CD7D392B997_0_130934732017490000.sqlaudit", audit_file_offset=191027200, user_defined_event_id=0`
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Tue, 08 Dec 2015 16:28:54 GMT</pubDate>
    <dc:creator>banderson7</dc:creator>
    <dc:date>2015-12-08T16:28:54Z</dc:date>
    <item>
      <title>Splunk Add-on for MIcrosoft SQL Server and DB Connect 2: How to extract and index mssql:audit "additional information" field?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-MIcrosoft-SQL-Server-and-DB-Connect-2-How-to/m-p/274724#M32070</link>
      <description>&lt;P&gt;We're polling an audit file from our SQL server, that includes a field called &lt;STRONG&gt;additional information.&lt;/STRONG&gt; This field has a field inside it: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;address&amp;gt;field&amp;lt;/address&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;that I need to be indexed. I may have done something wrong in setting up the input, because I kind of expected this to be an indexed field from the beginning.&lt;/P&gt;

&lt;P&gt;This is the input:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[mi_input://mssql:audit]
connection = SQLServer
index = main
interval = 60
max_rows = 10000
mode = tail
output_timestamp_format = YYYY-MM-dd HH:mm:ss
query = SELECT * FROM sys.fn_get_audit_file ('M:\\\\AuditFiles\\\\*',default,default)
source = dbx2
sourcetype = mssql:audit
tail_follow_only = 1
tail_rising_column_name = event_time
tail_rising_column_number = 1
ui_query_mode = advanced
disabled = 0
tail_rising_column_checkpoint_value = 1449605957973`
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and this is the result:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;"2015-12-08 11:15:19" event_time=1449609223316, sequence_number=1, action_id="LGIS", succeeded=1, permission_bitmask=## NOT SUPPORTED TYPE ##, is_column_permission=0, session_id=65, server_principal_id=274, database_principal_id=0, target_server_principal_id=0, target_database_principal_id=0, object_id=0, class_type="LX", session_server_principal_name="xxxx\svcSQLxxxx", server_principal_name="xxxx\svcSQLxxxx", server_principal_sid=## NOT SUPPORTED TYPE ##, target_server_principal_sid=## NOT SUPPORTED TYPE ##, server_instance_name="xxxxxxxxxx", statement="-- network protocol: LPC
set quoted_identifier on
set arithabort off
set numeric_roundabort off
set ansi_warnings on
set ansi_padding on
set ansi_nulls on
set concat_null_yields_null on
set cursor_close_on_commit off
set implicit_transactions off
set language us_english
set dateformat mdy
set datefirst 7
set transaction isolation level read committed", additional_information="&amp;lt;action_info xmlns="http://schemas.microsoft.com/sqlserver/2008/sqlaudit_data"&amp;gt;&amp;lt;pooled_connection&amp;gt;1&amp;lt;/pooled_connection&amp;gt;&amp;lt;client_options&amp;gt;0x28000020&amp;lt;/client_options&amp;gt;&amp;lt;client_options1&amp;gt;0x0001f438&amp;lt;/client_options1&amp;gt;&amp;lt;connect_options&amp;gt;0x00000000&amp;lt;/connect_options&amp;gt;&amp;lt;packet_data_size&amp;gt;8000&amp;lt;/packet_data_size&amp;gt;&amp;lt;address&amp;gt;local machine&amp;lt;/address&amp;gt;&amp;lt;is_dac&amp;gt;0&amp;lt;/is_dac&amp;gt;&amp;lt;/action_info&amp;gt;", file_name="M:\AuditFiles\Audit_Logins_Fail_Success_Log_42C90784-3268-445A-94B3-4CD7D392B997_0_130934732017490000.sqlaudit", audit_file_offset=191027200, user_defined_event_id=0`
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 08 Dec 2015 16:28:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-MIcrosoft-SQL-Server-and-DB-Connect-2-How-to/m-p/274724#M32070</guid>
      <dc:creator>banderson7</dc:creator>
      <dc:date>2015-12-08T16:28:54Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for MIcrosoft SQL Server and DB Connect 2: How to extract and index mssql:audit "additional information" field?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-MIcrosoft-SQL-Server-and-DB-Connect-2-How-to/m-p/274725#M32071</link>
      <description>&lt;P&gt;Have you tried to create a search query that gives you what you need?  Your best tools are probably spath or xpath in this case.  Something like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=mssql_audit | spath output=action_info_address path=action_info.address | table action_info_address
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Xpath syntax is similar, but not exactly the same.&lt;/P&gt;

&lt;P&gt;Once you have a working extraction at search time, you should be able to create a &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.3.1511/Knowledge/definecalcfields"&gt;calculated field&lt;/A&gt; in your props.conf so it's indexed ahead of time.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 04:49:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-MIcrosoft-SQL-Server-and-DB-Connect-2-How-to/m-p/274725#M32071</guid>
      <dc:creator>jamesarmitage</dc:creator>
      <dc:date>2015-12-09T04:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for MIcrosoft SQL Server and DB Connect 2: How to extract and index mssql:audit "additional information" field?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-MIcrosoft-SQL-Server-and-DB-Connect-2-How-to/m-p/274726#M32072</link>
      <description>&lt;P&gt;I see that it should be working, but it's not. The field isn't extracting.&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.0/SearchReference/spath" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.0/SearchReference/spath&lt;/A&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;action_info
    xmlns="http://schemas.microsoft.com/sqlserver/2008/sqlaudit_data"&amp;gt;
    &amp;lt;pooled_connection&amp;gt;1&amp;lt;/pooled_connection&amp;gt;
    &amp;lt;client_options&amp;gt;0x28000020&amp;lt;/client_options&amp;gt;
    &amp;lt;client_options1&amp;gt;0x0001f438&amp;lt;/client_options1&amp;gt;
    &amp;lt;connect_options&amp;gt;0x00000000&amp;lt;/connect_options&amp;gt;
    &amp;lt;packet_data_size&amp;gt;8000&amp;lt;/packet_data_size&amp;gt;
    &amp;lt;address&amp;gt;local machine&amp;lt;/address&amp;gt;
    &amp;lt;is_dac&amp;gt;0&amp;lt;/is_dac&amp;gt;
&amp;lt;/action_info&amp;gt;", file_name="M:\AuditFiles\Audit_Logins_Fail_Success_Log_42C90784-3268-445A-94B3-4CD7D392B997_0_130934732017490000.sqlaudit", audit_file_offset=223147008, user_defined_event_id=0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But the action_info_address field isn't extracted for some reason.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:08:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-MIcrosoft-SQL-Server-and-DB-Connect-2-How-to/m-p/274726#M32072</guid>
      <dc:creator>banderson7</dc:creator>
      <dc:date>2020-09-29T08:08:38Z</dc:date>
    </item>
  </channel>
</rss>

