<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Duplicate EventCode when using Splunk Add-on for Windows in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749017#M82067</link>
    <description>&lt;P&gt;Can you describe in more details your situation, and had you any solution?&lt;/P&gt;&lt;P&gt;Because I don't think we are using any kind of summary index, we got this duplicate EventCode in the regular index&lt;/P&gt;&lt;P&gt;And strangely enough, this only happen to our "XmlWinEventLog:Security" log, others like "XmlWinEventLog:Application" or "XmlWinEventLog:DNS Server" got their EventCode normal - as single values!&lt;/P&gt;</description>
    <pubDate>Tue, 01 Jul 2025 10:48:57 GMT</pubDate>
    <dc:creator>Na_Kang_Lim</dc:creator>
    <dc:date>2025-07-01T10:48:57Z</dc:date>
    <item>
      <title>Duplicate EventCode when using Splunk Add-on for Windows</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/747270#M81988</link>
      <description>&lt;P&gt;Splunk Add-on for Windows is well-known and I am using it to parse my XmlWinEventLog. However, upon using, I am getting EventCode as a duplicated codes in multiline, like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;4688
4688&lt;/LI-CODE&gt;&lt;P&gt;I think I could find the reason, as in the transforms.conf, there are 2 function for detecting EventCode:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[EventID_as_EventCode]
SOURCE_KEY = EventID
REGEX = (.+)
FORMAT = EventCode::$1

[EventID2_as_EventCode]
REGEX = &amp;lt;EventID.*?&amp;gt;(.+?)&amp;lt;\/EventID&amp;gt;.*
FORMAT = EventCode::$1&lt;/LI-CODE&gt;&lt;P&gt;And in the props.conf, both function is called:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;REPORT-EventCode_from_xml = EventID_as_EventCode, EventID2_as_EventCode&lt;/LI-CODE&gt;&lt;P&gt;However, I have never seen someone mentioned this issue, so is this because of my log? My log is the XML WinEventLog like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'&amp;gt;
    &amp;lt;System&amp;gt;
        &amp;lt;Provider Name='Microsoft-Windows-Security-Auditing'
            Guid='{68ad733a-0b7e-4010-a246-bad643c2e4c1}' /&amp;gt;
        &amp;lt;EventID&amp;gt;4688&amp;lt;/EventID&amp;gt;
        &amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;
        &amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;
        &amp;lt;Task&amp;gt;13312&amp;lt;/Task&amp;gt;
        &amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;
        &amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;
        &amp;lt;TimeCreated SystemTime='2025-05-30T10:55:19.179279400Z' /&amp;gt;
        &amp;lt;EventRecordID&amp;gt;25849216&amp;lt;/EventRecordID&amp;gt;
        &amp;lt;Correlation /&amp;gt;
        &amp;lt;Execution ProcessID='4' ThreadID='7780' /&amp;gt;
        &amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;
        &amp;lt;Computer&amp;gt;ABCD-DE01.company.domain&amp;lt;/Computer&amp;gt;
        &amp;lt;Security /&amp;gt;
    &amp;lt;/System&amp;gt;
    &amp;lt;EventData&amp;gt;
        &amp;lt;Data Name='SubjectUserSid'&amp;gt;S-1-5-18&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='SubjectUserName'&amp;gt;ABCD-DE01$&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='SubjectDomainName'&amp;gt;COMPANY.DOMAIN&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='SubjectLogonId'&amp;gt;0x3e7&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='NewProcessId'&amp;gt;0x1c48&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='NewProcessName'&amp;gt;C:\Windows\System32\net1.exe&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='TokenElevationType'&amp;gt;%%1936&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='ProcessId'&amp;gt;0x2a2c&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='CommandLine'&amp;gt;C:\Windows\system32\net1 accounts&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='TargetUserSid'&amp;gt;S-1-0-0&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='TargetUserName'&amp;gt;-&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='TargetDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='TargetLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='ParentProcessName'&amp;gt;C:\Windows\System32\net.exe&amp;lt;/Data&amp;gt;
        &amp;lt;Data Name='MandatoryLabel'&amp;gt;S-1-16-16384&amp;lt;/Data&amp;gt;
    &amp;lt;/EventData&amp;gt;
&amp;lt;/Event&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;The result of this is that the functions called below, using EventCode, cannot match the EventCode, like this one:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;EVAL-process_name = if(EventCode=4688, New_Process_Name, Process_Name)&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 30 May 2025 15:38:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/747270#M81988</guid>
      <dc:creator>Na_Kang_Lim</dc:creator>
      <dc:date>2025-05-30T15:38:29Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate EventCode when using Splunk Add-on for Windows</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/747271#M81989</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/308546"&gt;@Na_Kang_Lim&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I hadn't noticed the problem, but in any case, since it's an add-on maintained by Splunk, open a case with Splunk Support.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2025 15:41:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/747271#M81989</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-05-30T15:41:31Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate EventCode when using Splunk Add-on for Windows</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/748524#M82055</link>
      <description>&lt;P&gt;Just posting to confirm this, though I've never written in.&lt;/P&gt;&lt;P&gt;Running into it now as generating a summary index is changing the value type to AFAICT a string, meaning the previous value of 5136, 5136, which is searchable via EventCode=5136, is now broken in the summary index, where the value is now something like "5136\n5136" which... is not helpful at all.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 16:04:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/748524#M82055</guid>
      <dc:creator>pscookiemonster</dc:creator>
      <dc:date>2025-06-23T16:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate EventCode when using Splunk Add-on for Windows</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749017#M82067</link>
      <description>&lt;P&gt;Can you describe in more details your situation, and had you any solution?&lt;/P&gt;&lt;P&gt;Because I don't think we are using any kind of summary index, we got this duplicate EventCode in the regular index&lt;/P&gt;&lt;P&gt;And strangely enough, this only happen to our "XmlWinEventLog:Security" log, others like "XmlWinEventLog:Application" or "XmlWinEventLog:DNS Server" got their EventCode normal - as single values!&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 10:48:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749017#M82067</guid>
      <dc:creator>Na_Kang_Lim</dc:creator>
      <dc:date>2025-07-01T10:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate EventCode when using Splunk Add-on for Windows</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749026#M82069</link>
      <description>&lt;P&gt;Are you sure you don't have indexed extractions enabled by any chance? Since automatic KV extractions happen after manual extractions the EventID field should not be populated when you're hitting the transforms so the first transform (EventID_as_EventCode) should _not_ set the field to any value.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 12:32:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749026#M82069</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-07-01T12:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate EventCode when using Splunk Add-on for Windows</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749032#M82070</link>
      <description>&lt;P&gt;Can you tell me where to check if I have&amp;nbsp;&lt;SPAN&gt;indexed extractions enabled?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I don't know if this is relevant, but I do have the EventID field normal. So the EventCode maybe&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;4624
4624&lt;/LI-CODE&gt;&lt;P&gt;but the EventID is just 4624. And like I mentioned in the comments below, this only happen to my "XmlWinEventLog:Security" and&amp;nbsp;"XmlWinEventLog:DNS Server",&amp;nbsp; does not affect other XmlWinEventLog like Application and System. Which from my perspective, is really strange!&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 13:11:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749032#M82070</guid>
      <dc:creator>Na_Kang_Lim</dc:creator>
      <dc:date>2025-07-01T13:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate EventCode when using Splunk Add-on for Windows</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749038#M82071</link>
      <description>&lt;P&gt;I think the easiest way to verify whether that field is indexed (there might be some additional index-time extraction, apart from simple indexed-extraction configuration for the whole event; yes, I know it's confusing ;-)) is to try to search for&lt;/P&gt;&lt;PRE&gt;index=your_windows_index EventID::4624&lt;/PRE&gt;&lt;P&gt;The important thing is that you're not looking for&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;EventID=4624&lt;/PRE&gt;&lt;P&gt;but for&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;EventID::4624&lt;/PRE&gt;&lt;P&gt;If you get any results that will mean that this field is indeed indexed and you have to search where it's extracted in index time.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 13:30:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749038#M82071</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-07-01T13:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate EventCode when using Splunk Add-on for Windows</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749976#M82122</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;The OP is here.&lt;/P&gt;&lt;P&gt;My problem has been solved.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The cause was that one of our admins, mistakenly create another EXTRACT- clause for EventID in another app.&lt;/P&gt;&lt;P&gt;So here is my advice if you ever get into similar situation:&lt;/P&gt;&lt;P&gt;1. Find whether the field is being affected, is created with index-time extraction or search-time extraction. You check this either using the `::` operator, or in the props.conf and transforms.conf file (REPORT- and EXTRACT- are search time, which happen on search head; and TRANSFORMS- is index-time which happen on Indexers). Look into how it is extracted!&lt;/P&gt;&lt;P&gt;2. Then grep the field name in the apps directory (or slave-apps, master-apps - depend on your scope and set up), look into all the functions that affected the field in props.conf and transforms.conf&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jul 2025 08:07:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749976#M82122</guid>
      <dc:creator>Na_Kang_Lim</dc:creator>
      <dc:date>2025-07-17T08:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate EventCode when using Splunk Add-on for Windows</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749979#M82123</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/308546"&gt;@Na_Kang_Lim&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;good for you, see next time!&lt;/P&gt;&lt;P&gt;Ciao and happy splunking&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated by all the contributors &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jul 2025 08:11:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Duplicate-EventCode-when-using-Splunk-Add-on-for-Windows/m-p/749979#M82123</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-07-17T08:11:09Z</dc:date>
    </item>
  </channel>
</rss>

