<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why isn't the Sysmon Technology Add-on Parsing my Sysmon Logs? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Why-isn-t-the-Sysmon-Technology-Add-on-Parsing-my-Sysmon-Logs/m-p/370759#M67329</link>
    <description>&lt;P&gt;It appears that using the default "winevtx-preprocessor" source type in combination with installing Sysmon on the Splunk Server did the trick. If Sysmon is not installed, the events seem to either truncate after the "Message=" or Splunk will write an error into each event explaining it doesn't understand the event message format.&lt;/P&gt;

&lt;P&gt;I can't say for certain if some of the other steps I mentioned before helped these parse, but fortunately it is working now.&lt;/P&gt;</description>
    <pubDate>Fri, 09 Feb 2018 02:26:55 GMT</pubDate>
    <dc:creator>cbenn7</dc:creator>
    <dc:date>2018-02-09T02:26:55Z</dc:date>
    <item>
      <title>Why isn't the Sysmon Technology Add-on Parsing my Sysmon Logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-isn-t-the-Sysmon-Technology-Add-on-Parsing-my-Sysmon-Logs/m-p/370757#M67327</link>
      <description>&lt;P&gt;What needs to happen in order for SysmonTA to parse the Windows Sysmon Event Logs? Here is the output I get when I try to upload the file manually:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;I select - &lt;CODE&gt;"Sourcetype XmlWinEventLog:Microsoft-Windows-Sysmon/Operational"&lt;/CODE&gt; from the Sourcetype List&lt;/LI&gt;
&lt;LI&gt;Splunk displays error "Not Found"&lt;/LI&gt;
&lt;LI&gt;All I see in the Parsing Preview in the Right Pane is &lt;CODE&gt;"ElfFile\x00\x00\x00\x00\x00\x00\x00\x00\x00&amp;#4;\x00\x00..."&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI&gt;If I try to leave the Sourcetype Picker at the default of win-event-preprocessor, it will only parse a fraction of the fields, for example:&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;List item&lt;/P&gt;

&lt;P&gt;02/07/2018 08:25:27 PM&lt;BR /&gt;
    LogName=E:\Splunk\var\run\splunk\upload\A6BBADBE-19F4-4252-BDB1-5D5B748B5244&lt;BR /&gt;
    SourceName=Microsoft-Windows-Sysmon&lt;BR /&gt;
    EventCode=5&lt;BR /&gt;
    EventType=4&lt;BR /&gt;
    Type=Information&lt;BR /&gt;
    ComputerName=win-srv&lt;BR /&gt;
    User=SYSTEM&lt;BR /&gt;
    Sid=S-1-5-18&lt;BR /&gt;
    SidType=1&lt;BR /&gt;
    Category=5&lt;BR /&gt;
    CategoryString=none&lt;BR /&gt;
    RecordNumber=18&lt;BR /&gt;
    Message=&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;If I try to monitor the whole directory and select "Automatic" sourcetype determination, it will parse with &lt;CODE&gt;"Elf\x00\x00."&lt;/CODE&gt; as if it was plaintext log data.&lt;/P&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;I am using the default props/transforms files that are included with &lt;STRONG&gt;TASysmon version 6.07&lt;/STRONG&gt;, and also tried version &lt;STRONG&gt;6.05&lt;/STRONG&gt;.&lt;/P&gt;

&lt;P&gt;Here is what I have tried to fix:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Adding a "local" directory with the same files as "default" in the app folder. &lt;/LI&gt;
&lt;LI&gt;Changing the inputs in the local folder to monitor a particular directory with my Sysmon Log.&lt;/LI&gt;
&lt;LI&gt;Adding the props/transforms from the Add-On to ../system/local folders&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Any help would be appreciated. I truly thought this would be a simpler task!&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2018 21:30:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-isn-t-the-Sysmon-Technology-Add-on-Parsing-my-Sysmon-Logs/m-p/370757#M67327</guid>
      <dc:creator>cbenn7</dc:creator>
      <dc:date>2018-02-08T21:30:18Z</dc:date>
    </item>
    <item>
      <title>Re: Why isn't the Sysmon Technology Add-on Parsing my Sysmon Logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-isn-t-the-Sysmon-Technology-Add-on-Parsing-my-Sysmon-Logs/m-p/370758#M67328</link>
      <description>&lt;P&gt;The add-on for Microsoft Systmon (&lt;A href="https://splunkbase.splunk.com/app/1914"&gt;https://splunkbase.splunk.com/app/1914&lt;/A&gt;) assumes that your sysmon events are forwarded by the splunk-wineventlog handler and rendered as xml.  I can see from the value of the LogName field in your example that you are aggregating the input from an unexpected input source and thus the format is likely unhanded.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2018 00:11:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-isn-t-the-Sysmon-Technology-Add-on-Parsing-my-Sysmon-Logs/m-p/370758#M67328</guid>
      <dc:creator>dstaulcu</dc:creator>
      <dc:date>2018-02-09T00:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: Why isn't the Sysmon Technology Add-on Parsing my Sysmon Logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-isn-t-the-Sysmon-Technology-Add-on-Parsing-my-Sysmon-Logs/m-p/370759#M67329</link>
      <description>&lt;P&gt;It appears that using the default "winevtx-preprocessor" source type in combination with installing Sysmon on the Splunk Server did the trick. If Sysmon is not installed, the events seem to either truncate after the "Message=" or Splunk will write an error into each event explaining it doesn't understand the event message format.&lt;/P&gt;

&lt;P&gt;I can't say for certain if some of the other steps I mentioned before helped these parse, but fortunately it is working now.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2018 02:26:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-isn-t-the-Sysmon-Technology-Add-on-Parsing-my-Sysmon-Logs/m-p/370759#M67329</guid>
      <dc:creator>cbenn7</dc:creator>
      <dc:date>2018-02-09T02:26:55Z</dc:date>
    </item>
  </channel>
</rss>

