<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How is Splunk creating the signature_id field for Windows Event Logs? in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/668714#M17875</link>
    <description>&lt;P&gt;What do you mean by "stream processed"?&lt;/P&gt;&lt;P&gt;This config stanza should produce XML-formatted evetns, not jsons. So something is actively fiddling with your data before it's ingested. You should check the config of that solution.&lt;/P&gt;</description>
    <pubDate>Wed, 15 Nov 2023 09:33:38 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2023-11-15T09:33:38Z</dc:date>
    <item>
      <title>How is Splunk creating the signature_id field for Windows Event Logs?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/667929#M17827</link>
      <description>&lt;P&gt;I'm trying to troubleshoot some Windows Event Log events coming into Splunk.&lt;/P&gt;&lt;P&gt;The events are stream processed, and come in as JSON. Here is a sample (obfuscated).&lt;/P&gt;&lt;PRE&gt;{"&lt;SPAN class=""&gt;Version&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;0&lt;/SPAN&gt;","&lt;SPAN class=""&gt;Level&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;0&lt;/SPAN&gt;","&lt;SPAN class=""&gt;Task&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;12345&lt;/SPAN&gt;","&lt;SPAN class=""&gt;Opcode&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;0&lt;/SPAN&gt;","&lt;SPAN class=""&gt;Keywords&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;0x8020000000000000&lt;/SPAN&gt;","&lt;SPAN class=""&gt;Correlation_ActivityID&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"{&lt;SPAN class=""&gt;99999999-9999-9999-9999-999999999999&lt;/SPAN&gt;}","&lt;SPAN class=""&gt;Channel&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;Security&lt;/SPAN&gt;","&lt;SPAN class=""&gt;Guid&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;99999999-9999-9999-9999-999999999999&lt;/SPAN&gt;","&lt;SPAN class=""&gt;Name&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;Microsoft-Windows-Security-Auditing&lt;/SPAN&gt;","&lt;SPAN class=""&gt;ProcessID&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"123","&lt;SPAN class=""&gt;ThreadID&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;12345&lt;/SPAN&gt;","&lt;SPAN class=""&gt;RecordID&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;999999&lt;/SPAN&gt;","&lt;SPAN class=""&gt;TargetUserSid&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;AD\\user&lt;/SPAN&gt;","&lt;SPAN class=""&gt;TargetLogonId&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;0xXXXXXXXXX&lt;/SPAN&gt;"}&lt;/PRE&gt;&lt;P&gt;There are a number of indexed fields as well, including "Computer" and "EventID".&lt;/P&gt;&lt;P&gt;What's interesting - signature_id seems to be created, but when I search on it, it fails. In this event, signature_id is shown under "Interesting Fields" with the value 4647, but if I put signature_id=4647 in the search line, it comes back with no results. If I put EventID=4647, it comes back with the result. I'm using Smart Mode.&lt;/P&gt;&lt;P&gt;This led me to digging into the Fields configurations (alias', calculations, etc.) but I couldn't figure out how signature_id was created in the Windows TA. Can anyone provide any insight?&lt;/P&gt;&lt;P&gt;Thank you!&lt;BR /&gt;Ed&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 16:36:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/667929#M17827</guid>
      <dc:creator>ejwade</dc:creator>
      <dc:date>2023-11-08T16:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: How is Splunk creating the signature_id field for Windows Event Logs?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/667957#M17828</link>
      <description>&lt;P&gt;Hi - can you post name of the sourcetype to the event where &lt;FONT face="courier new,courier"&gt;EventID=4647&lt;/FONT&gt;&amp;nbsp;comes up? You can then search for the sourcetype name in &lt;FONT face="courier new,courier"&gt;Splunk_TA_windows/default/props.conf&amp;nbsp;&lt;FONT face="arial,helvetica,sans-serif"&gt;to see how signature_id field is created.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 18:44:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/667957#M17828</guid>
      <dc:creator>m_pham</dc:creator>
      <dc:date>2023-11-08T18:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: How is Splunk creating the signature_id field for Windows Event Logs?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/667971#M17829</link>
      <description>&lt;P&gt;It does not look like any standard Splunk Windows-related sourcetype so it's hard to say from experience. You need to find the source of the file yourself. It might be either an indexed field or search-time extraction (for which you can just brute-force grep all your .conf files if all else fails).&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 19:22:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/667971#M17829</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-11-08T19:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: How is Splunk creating the signature_id field for Windows Event Logs?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/668004#M17833</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/228716"&gt;@m_pham&lt;/a&gt;. I am using a standard source and sourcetype.&lt;/P&gt;&lt;P&gt;sourcetype="xmlwineventlog"&lt;BR /&gt;source="WinEventLog:Security"&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 01:00:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/668004#M17833</guid>
      <dc:creator>ejwade</dc:creator>
      <dc:date>2023-11-09T01:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: How is Splunk creating the signature_id field for Windows Event Logs?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/668050#M17836</link>
      <description>&lt;P&gt;OK. This is definitely &lt;STRONG&gt;not&lt;/STRONG&gt; what XML windows events look like.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 10:55:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/668050#M17836</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-11-09T10:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: How is Splunk creating the signature_id field for Windows Event Logs?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/668108#M17843</link>
      <description>&lt;P&gt;So a few questions:&lt;/P&gt;&lt;P&gt;What is the version number of the Windows TA are you using on your search head?&lt;/P&gt;&lt;P&gt;What version number of the Windows TA on your UF for this data? What does your inputs.conf look like for the following stanza?&amp;nbsp;&lt;SPAN&gt;[WinEventLog://&lt;/SPAN&gt;&lt;SPAN&gt;Security&lt;/SPAN&gt;&lt;SPAN&gt;]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Like&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;said in his comment, this doesn't look like a standard Windows Event Log.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 16:59:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/668108#M17843</guid>
      <dc:creator>m_pham</dc:creator>
      <dc:date>2023-11-09T16:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: How is Splunk creating the signature_id field for Windows Event Logs?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/668647#M17873</link>
      <description>&lt;P&gt;The Windows TA on the search heads is 8.6.0, and the Windows TA on the HF us 9.0.6.&lt;/P&gt;&lt;P&gt;Here is the inputs.conf stanza for Security.&lt;/P&gt;&lt;PRE&gt;[WinEventLog://Security]&lt;BR /&gt;disabled = 0&lt;BR /&gt;start_from = oldest&lt;BR /&gt;current_only = 0&lt;BR /&gt;evt_resolve_ad_obj = 1&lt;BR /&gt;checkpointInterval = 5&lt;BR /&gt;blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;blacklist2 = EventCode="566" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;index = test_i&lt;BR /&gt;renderXml=true&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;The events are stream processed, and come in as JSON.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 21:18:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/668647#M17873</guid>
      <dc:creator>ejwade</dc:creator>
      <dc:date>2023-11-14T21:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: How is Splunk creating the signature_id field for Windows Event Logs?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/668714#M17875</link>
      <description>&lt;P&gt;What do you mean by "stream processed"?&lt;/P&gt;&lt;P&gt;This config stanza should produce XML-formatted evetns, not jsons. So something is actively fiddling with your data before it's ingested. You should check the config of that solution.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 09:33:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-is-Splunk-creating-the-signature-id-field-for-Windows-Event/m-p/668714#M17875</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-11-15T09:33:38Z</dc:date>
    </item>
  </channel>
</rss>

