<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows Events Message field in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142622#M29164</link>
    <description>&lt;P&gt;"Windows events message field extraction" is a much better title.  I thought you were going to discuss the meanings of the fields themselves with your current title "Windows events message field"&lt;/P&gt;</description>
    <pubDate>Tue, 29 Apr 2014 13:13:34 GMT</pubDate>
    <dc:creator>landen99</dc:creator>
    <dc:date>2014-04-29T13:13:34Z</dc:date>
    <item>
      <title>Windows Events Message field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142616#M29158</link>
      <description>&lt;P&gt;Greetings, &lt;BR /&gt;
We've been having an issue extracting a few fields in the following event specifically. This windows Event has the Message field containing the desired fields, the values for those desired fields however are carriage returned and evade the built in extraction tools as well as erex.&lt;/P&gt;

&lt;P&gt;Full Event as it exists raw: &lt;/P&gt;

&lt;P&gt;11/01/2013 02:23:15 PM&lt;BR /&gt;
LogName=Directory Service&lt;BR /&gt;
SourceName=Microsoft-Windows-ActiveDirectory_DomainService&lt;BR /&gt;
EventCode=2889&lt;BR /&gt;
EventType=4&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=*******&lt;BR /&gt;
User=*****&lt;BR /&gt;
Sid=***&lt;BR /&gt;
SidType=*&lt;BR /&gt;
TaskCategory=LDAP Interface&lt;BR /&gt;
OpCode=None&lt;BR /&gt;
RecordNumber=******&lt;BR /&gt;
Keywords=Classic&lt;BR /&gt;
Message=The following client performed a SASL (Negotiate/Kerberos/NTLM/Digest) LDAP bind without requesting signing (integrity verification), or performed a simple bind over a cleartext (non-SSL/TLS-encrypted) LDAP connection. &lt;/P&gt;

&lt;P&gt;Client IP address:&lt;BR /&gt;
IPADDRESS:PORT &lt;BR /&gt;
Identity the client attempted to authenticate as:&lt;BR /&gt;
Domain\Username&lt;/P&gt;

&lt;P&gt;The particular values we wish to extract:&lt;/P&gt;

&lt;P&gt;Client IP address:&lt;BR /&gt;
IPADDRESS:PORT &lt;BR /&gt;
Identity the client attempted to authenticate as:&lt;BR /&gt;
Domain\Username&lt;/P&gt;

&lt;HR /&gt;

&lt;P&gt;The built in utilities actually skip the 2 fields and only display the data up to the first carriage return between the message statement and Client IP address:, this may be why it also breaks erex, as the built in extractor just does not even see the data to attempt to learn the extraction. &lt;/P&gt;

&lt;P&gt;Additionally, we have tried a few props transforms that I've seen floating around here, to aid in extracting values out of the Windows Message field, but those seem to have no change either on these 2 data fields with the carriage return. &lt;/P&gt;

&lt;P&gt;Thanks!&lt;BR /&gt;
Brandon &lt;/P&gt;

&lt;HR /&gt;

&lt;P&gt;Added for luke below : &lt;BR /&gt;
Sure thing, here it is right off that raw search, with various items redacted to make our security guy happy. &lt;/P&gt;

&lt;P&gt;11/14/2013 11:35:11 AM LogName=Directory Service SourceName=Microsoft-Windows-ActiveDirectory_DomainService EventCode=2889 EventType=4 Type=Information ComputerName#### User=#### Sid#### SidType=5 TaskCategory=LDAP Interface OpCode=None RecordNumber=1681746 Keywords=Classic Message=The following client performed a SASL (Negotiate/Kerberos/NTLM/Digest) LDAP bind without requesting signing (integrity verification), or performed a simple bind over a cleartext (non-SSL/TLS-encrypted) LDAP connection. Client IP address: ####:#### Identity the client attempted to authenticate as: #### \ ####&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2013 17:21:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142616#M29158</guid>
      <dc:creator>be910j</dc:creator>
      <dc:date>2013-11-14T17:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Message field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142617#M29159</link>
      <description>&lt;P&gt;Carriage returns don't affect the automatic extraction for any of my Windows Message fields, but I can't test this specific event.  Can you post the _raw data for one such event?&lt;BR /&gt;
EventCode=2889 | dedup EventCode | table _raw&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2013 17:31:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142617#M29159</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-11-14T17:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Message field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142618#M29160</link>
      <description>&lt;P&gt;Try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;EventCode=2889 |rex field=_raw ".*Client\sIP\saddress:\s+(?&amp;lt;ClientIPAddressPort&amp;gt;.*)\r\n" | rex field=_raw ".*authenticate\sas:\s+(?&amp;lt;DomainUsername&amp;gt;.*)\r\n" 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 14 Nov 2013 18:02:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142618#M29160</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-11-14T18:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Message field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142619#M29161</link>
      <description>&lt;P&gt;Sweet, that got the IP:port working, the Domain\username still isn't showing up though. Just realized my raw snipet above removed the \ on that, so its attempted to authenticate as: space DOMAIN\username&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2013 18:11:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142619#M29161</guid>
      <dc:creator>be910j</dc:creator>
      <dc:date>2013-11-14T18:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Message field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142620#M29162</link>
      <description>&lt;P&gt;That should be working.  \s stands for space.  + means one or more.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2013 18:27:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142620#M29162</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-11-14T18:27:17Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Message field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142621#M29163</link>
      <description>&lt;P&gt;Figured it out, it was just the trailing \r \n on the last extract, removed those and it  works like a charm, has both fields completely extracted! &lt;BR /&gt;
Thanks luke!&lt;BR /&gt;
Brandon&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2013 19:39:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142621#M29163</guid>
      <dc:creator>be910j</dc:creator>
      <dc:date>2013-11-21T19:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Message field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142622#M29164</link>
      <description>&lt;P&gt;"Windows events message field extraction" is a much better title.  I thought you were going to discuss the meanings of the fields themselves with your current title "Windows events message field"&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2014 13:13:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/142622#M29164</guid>
      <dc:creator>landen99</dc:creator>
      <dc:date>2014-04-29T13:13:34Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Message field</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/598402#M104387</link>
      <description>&lt;P&gt;I know this is a really old post, but this is exactly what I think I need to do.&amp;nbsp; I am too much of a noob to follow this.&amp;nbsp; Are you still out there?&lt;/P&gt;&lt;P&gt;Specifically, I want to search for Windows Security 4776 sucess events, deduplicate the list based on the value in the "Logon Account:&amp;nbsp; UserX" string within the events message field.&amp;nbsp; SO I think I need to extract the "Logon Event: UserX" sting so the filed is Logon Account: and the Dedup is applied to the value of that field&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2022 03:13:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Message-field/m-p/598402#M104387</guid>
      <dc:creator>buskeyl</dc:creator>
      <dc:date>2022-05-19T03:13:58Z</dc:date>
    </item>
  </channel>
</rss>

