<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Splunk for SQL Server - props.conf field extractions RegEx not returning data in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-SQL-Server-props-conf-field-extractions-RegEx-not/m-p/115111#M8502</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;We are currently evaluating the Microsoft SQL Server App and none of our Security Dashboards are populating.  We have been investigating this for a few days now and I believe we have narrowed down to the field extractions in props.conf not returning any data both within Splunk, and also when I run through a regular expression tester.&lt;/P&gt;

&lt;P&gt;For example:&lt;/P&gt;

&lt;P&gt;EXTRACT-mssql_33205_class_type=(?ms)EventCode=33205\n.&lt;EM&gt;\nclass_type:(?&lt;CLASS_TYPE&gt;.&lt;/CLASS_TYPE&gt;&lt;/EM&gt;?)\n&lt;/P&gt;

&lt;P&gt;when put against my audit log file (I omitted lines for security related purposes)&lt;/P&gt;

&lt;P&gt;SidType=1&lt;BR /&gt;
TaskCategory=Failover&lt;BR /&gt;
OpCode=None&lt;BR /&gt;
RecordNumber=3393348&lt;BR /&gt;
Keywords=Audit Success, Classic&lt;BR /&gt;
Message=Audit event: event_time:2014-03-28 14:36:09.0903622&lt;BR /&gt;
sequence_number:2&lt;BR /&gt;
action_id:VSST&lt;BR /&gt;
succeeded:true&lt;BR /&gt;
permission_bitmask:0&lt;BR /&gt;
is_column_permission:false&lt;BR /&gt;
session_id:59&lt;BR /&gt;
server_principal_id:2&lt;BR /&gt;
database_principal_id:1&lt;BR /&gt;
target_server_principal_id:0&lt;BR /&gt;
target_database_principal_id:0&lt;BR /&gt;
object_id:0&lt;BR /&gt;
class_type:SR&lt;/P&gt;

&lt;P&gt;We do know however that all eventtypes are working properly and going into their proper Indexes because I consistently see EventCode 33205 being brought into our Splunk Indexer Development environment based on the sample from my Splunk event below:&lt;/P&gt;

&lt;P&gt;03/28/2014 10:36:09 AM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=MSSQLSERVER$AUDIT&lt;BR /&gt;
EventCode=33205&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;/P&gt;

&lt;P&gt;I'm extremely puzzled that the props.conf that came with the app would have Regular Expressions that do not work but as I mentioned both when I run them within Splunk or through an online RegEx tested and my sample data I never see any matches, hence we go to use the eventtype=mssql-audit and process it through the transforms.conf file against the lookups, we never return any data which explains why the dashboards do not populate.&lt;/P&gt;

&lt;P&gt;Any help on this appreciated because rather than write our own RegEx's we want to see where the error might be at.&lt;/P&gt;

&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 16:17:26 GMT</pubDate>
    <dc:creator>millern4</dc:creator>
    <dc:date>2020-09-28T16:17:26Z</dc:date>
    <item>
      <title>Splunk for SQL Server - props.conf field extractions RegEx not returning data</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-SQL-Server-props-conf-field-extractions-RegEx-not/m-p/115111#M8502</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;We are currently evaluating the Microsoft SQL Server App and none of our Security Dashboards are populating.  We have been investigating this for a few days now and I believe we have narrowed down to the field extractions in props.conf not returning any data both within Splunk, and also when I run through a regular expression tester.&lt;/P&gt;

&lt;P&gt;For example:&lt;/P&gt;

&lt;P&gt;EXTRACT-mssql_33205_class_type=(?ms)EventCode=33205\n.&lt;EM&gt;\nclass_type:(?&lt;CLASS_TYPE&gt;.&lt;/CLASS_TYPE&gt;&lt;/EM&gt;?)\n&lt;/P&gt;

&lt;P&gt;when put against my audit log file (I omitted lines for security related purposes)&lt;/P&gt;

&lt;P&gt;SidType=1&lt;BR /&gt;
TaskCategory=Failover&lt;BR /&gt;
OpCode=None&lt;BR /&gt;
RecordNumber=3393348&lt;BR /&gt;
Keywords=Audit Success, Classic&lt;BR /&gt;
Message=Audit event: event_time:2014-03-28 14:36:09.0903622&lt;BR /&gt;
sequence_number:2&lt;BR /&gt;
action_id:VSST&lt;BR /&gt;
succeeded:true&lt;BR /&gt;
permission_bitmask:0&lt;BR /&gt;
is_column_permission:false&lt;BR /&gt;
session_id:59&lt;BR /&gt;
server_principal_id:2&lt;BR /&gt;
database_principal_id:1&lt;BR /&gt;
target_server_principal_id:0&lt;BR /&gt;
target_database_principal_id:0&lt;BR /&gt;
object_id:0&lt;BR /&gt;
class_type:SR&lt;/P&gt;

&lt;P&gt;We do know however that all eventtypes are working properly and going into their proper Indexes because I consistently see EventCode 33205 being brought into our Splunk Indexer Development environment based on the sample from my Splunk event below:&lt;/P&gt;

&lt;P&gt;03/28/2014 10:36:09 AM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=MSSQLSERVER$AUDIT&lt;BR /&gt;
EventCode=33205&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;/P&gt;

&lt;P&gt;I'm extremely puzzled that the props.conf that came with the app would have Regular Expressions that do not work but as I mentioned both when I run them within Splunk or through an online RegEx tested and my sample data I never see any matches, hence we go to use the eventtype=mssql-audit and process it through the transforms.conf file against the lookups, we never return any data which explains why the dashboards do not populate.&lt;/P&gt;

&lt;P&gt;Any help on this appreciated because rather than write our own RegEx's we want to see where the error might be at.&lt;/P&gt;

&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:17:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-SQL-Server-props-conf-field-extractions-RegEx-not/m-p/115111#M8502</guid>
      <dc:creator>millern4</dc:creator>
      <dc:date>2020-09-28T16:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for SQL Server - props.conf field extractions RegEx not returning data</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-SQL-Server-props-conf-field-extractions-RegEx-not/m-p/115112#M8503</link>
      <description>&lt;P&gt;Additional information on this:&lt;/P&gt;

&lt;P&gt;The data we are looking to process through the field extractions is not showing up in the field 33205, it is showing up under "Message" which is now explaining why these do not return data when run against the extractions contained within the Splunk for SQL Server App props.con&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2014 15:53:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-SQL-Server-props-conf-field-extractions-RegEx-not/m-p/115112#M8503</guid>
      <dc:creator>millern4</dc:creator>
      <dc:date>2014-04-01T15:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for SQL Server - props.conf field extractions RegEx not returning data</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-SQL-Server-props-conf-field-extractions-RegEx-not/m-p/115113#M8504</link>
      <description>&lt;P&gt;The latest version of the SQL Server corrected the EXTRACT-based field extractions and replaced them with the more appropriate transforms-based extractions.  Please re-try with the latest version.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2014 00:04:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-SQL-Server-props-conf-field-extractions-RegEx-not/m-p/115113#M8504</guid>
      <dc:creator>ahall_splunk</dc:creator>
      <dc:date>2014-04-03T00:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for SQL Server - props.conf field extractions RegEx not returning data</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-SQL-Server-props-conf-field-extractions-RegEx-not/m-p/115114#M8505</link>
      <description>&lt;P&gt;Thanks Adrian,&lt;/P&gt;

&lt;P&gt;After doing the update all security dashboards are now displaying correctly with the exception of the failed server logins:&lt;/P&gt;

&lt;P&gt;It's failing on a part of the transforms:&lt;BR /&gt;
stats latest(time) as lastattempt,sum(flc) as flc,sum(slc) as slc,values(flv) as flv,values(slv) as slv by srcip | where flc &amp;gt; 0 | eval slc=if(slc&amp;gt;0,"Yes","") | eval lastattempt=strftime(lastattempt,"%F %T") | table srcip,lastattempt, flv, slv, slc | rename srcip as "Source", last_attempt as "Last Attempt", flv as "Failed Logon IDs", slv as "Successful Logon IDs", slc as "Successful?"&lt;/P&gt;</description>
      <pubDate>Fri, 04 Apr 2014 18:41:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-SQL-Server-props-conf-field-extractions-RegEx-not/m-p/115114#M8505</guid>
      <dc:creator>millern4</dc:creator>
      <dc:date>2014-04-04T18:41:59Z</dc:date>
    </item>
  </channel>
</rss>

