<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extract full XML from Windows EventLog sent by UF in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Extract-full-XML-from-Windows-EventLog-sent-by-UF/m-p/412552#M73030</link>
    <description>&lt;P&gt;You can used spath also.You will get two fields.Use eval to concatenate the two fields. &lt;/P&gt;</description>
    <pubDate>Mon, 21 Jan 2019 06:54:29 GMT</pubDate>
    <dc:creator>a_m_s</dc:creator>
    <dc:date>2019-01-21T06:54:29Z</dc:date>
    <item>
      <title>Extract full XML from Windows EventLog sent by UF</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Extract-full-XML-from-Windows-EventLog-sent-by-UF/m-p/412550#M73028</link>
      <description>&lt;P&gt;Hello all,&lt;BR /&gt;
I have some events like this which are forwarded to Splunk from UF&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name='Microsoft-Windows-Security-Auditing' Guid='{54849625-5478-4994-A5BA-3E3B0328C30D}'/&amp;gt;&amp;lt;EventID&amp;gt;5058&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;0&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;12292&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime='2019-01-18T07:53:58.917178000Z'/&amp;gt;&amp;lt;EventRecordID&amp;gt;24044556&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Execution ProcessID='580' ThreadID='22604'/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;xxx&amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name='SubjectUserSid'&amp;gt;S-1-5-20&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectUserName'&amp;gt;xxx&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectDomainName'&amp;gt;xxx&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectLogonId'&amp;gt;0x3e4&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProviderName'&amp;gt;Microsoft Software Key Storage Provider&amp;lt;/Data&amp;gt;&amp;lt;Data Name='AlgorithmName'&amp;gt;UNKNOWN&amp;lt;/Data&amp;gt;&amp;lt;Data Name='KeyName'&amp;gt;20edf1c5b7372d0abb08e7175c58b0f1_81e1b500-e237-4510-a356-3d55074d9020&amp;lt;/Data&amp;gt;&amp;lt;Data Name='KeyType'&amp;gt;%%2499&amp;lt;/Data&amp;gt;&amp;lt;Data Name='KeyFilePath'&amp;gt;C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\20edf1c5b7372d0abb08e7175c58b0f1_81e1b500-e237-4510-a356-3d55074d9020&amp;lt;/Data&amp;gt;&amp;lt;Data Name='Operation'&amp;gt;%%2458&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ReturnCode'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;my props.conf looks like this&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::WinEventLog]
TZ = Europe/London
REPORT-xmlkv = xmlkv-alternative
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;my transforms.conf looks like this&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[xmlkv-alternative]
REGEX = &amp;lt;([^\s\&amp;gt;]*)[^\&amp;gt;]*\&amp;gt;([^&amp;lt;]*)\&amp;lt;\/\1\&amp;gt;
FORMAT = $1::$2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;the result i get for Data field is like this&lt;/STRONG&gt; &lt;BR /&gt;
S-1-5-20&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;What i expect from the Data field is like this&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;Data Name='SubjectUserSid'&amp;gt;S-1-5-20&amp;lt;/Data&amp;gt;
&amp;lt;Data Name='SubjectUserName'&amp;gt;xxx&amp;lt;/Data&amp;gt;
&amp;lt;Data Name='SubjectDomainName'&amp;gt;xxx&amp;lt;/Data&amp;gt;
&amp;lt;Data Name='SubjectLogonId'&amp;gt;0x3e4&amp;lt;/Data&amp;gt;
&amp;lt;Data Name='ProviderName'&amp;gt;Microsoft Software Key Storage Provider&amp;lt;/Data&amp;gt;
&amp;lt;Data Name='AlgorithmName'&amp;gt;UNKNOWN&amp;lt;/Data&amp;gt;
&amp;lt;Data Name='KeyName'&amp;gt;20edf1c5b7372d0abb08e7175c58b0f1_81e1b500-e237-4510-a356-3d55074d9020&amp;lt;/Data&amp;gt;
&amp;lt;Data Name='KeyType'&amp;gt;%%2499&amp;lt;/Data&amp;gt;
&amp;lt;Data Name='KeyFilePath'&amp;gt;C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\20edf1c5b7372d0abb08e7175c58b0f1_81e1b500-e237-4510-a356-3d55074d9020&amp;lt;/Data&amp;gt;
&amp;lt;Data Name='Operation'&amp;gt;%%2458&amp;lt;/Data&amp;gt;
&amp;lt;Data Name='ReturnCode'&amp;gt;0x0&amp;lt;/Data&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;Or (preferred)&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;'SubjectUserSid'=S-1-5-20
'SubjectUserName'=xxx
'SubjectDomainName'=xxx
'SubjectLogonId'=0x3e4
'ProviderName'=Microsoft Software Key Storage Provider
'AlgorithmName'=UNKNOWN
'KeyName'=20edf1c5b7372d0abb08e7175c58b0f1_81e1b500-e237-4510-a356-3d55074d9020
'KeyType'=%%2499
'KeyFilePath'=C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\20edf1c5b7372d0abb08e7175c58b0f1_81e1b500-e237-4510-a356-3d55074d9020
'Operation'=%%2458
'ReturnCode'=0x0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Can this be done? Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 08:09:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Extract-full-XML-from-Windows-EventLog-sent-by-UF/m-p/412550#M73028</guid>
      <dc:creator>Cbr1sg</dc:creator>
      <dc:date>2019-01-18T08:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: Extract full XML from Windows EventLog sent by UF</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Extract-full-XML-from-Windows-EventLog-sent-by-UF/m-p/412551#M73029</link>
      <description>&lt;P&gt;Your "preferred" result :)-&lt;BR /&gt;
 event_source|rex field=_raw "(.&lt;EM&gt;?)&amp;gt;(.&lt;/EM&gt;?))&amp;lt;\/Data&amp;gt;" max_match=20 | mvexpand a | rex field=result mode=sed "s/&amp;gt;/=/g"&lt;/P&gt;

&lt;P&gt;&lt;IMG src="https://community.splunk.com/storage/temp/263688-splunk-answer.png" alt="alt text" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:50:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Extract-full-XML-from-Windows-EventLog-sent-by-UF/m-p/412551#M73029</guid>
      <dc:creator>a_m_s</dc:creator>
      <dc:date>2020-09-29T22:50:01Z</dc:date>
    </item>
    <item>
      <title>Re: Extract full XML from Windows EventLog sent by UF</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Extract-full-XML-from-Windows-EventLog-sent-by-UF/m-p/412552#M73030</link>
      <description>&lt;P&gt;You can used spath also.You will get two fields.Use eval to concatenate the two fields. &lt;/P&gt;</description>
      <pubDate>Mon, 21 Jan 2019 06:54:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Extract-full-XML-from-Windows-EventLog-sent-by-UF/m-p/412552#M73030</guid>
      <dc:creator>a_m_s</dc:creator>
      <dc:date>2019-01-21T06:54:29Z</dc:date>
    </item>
    <item>
      <title>Re: Extract full XML from Windows EventLog sent by UF</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Extract-full-XML-from-Windows-EventLog-sent-by-UF/m-p/412553#M73031</link>
      <description>&lt;P&gt;The rex in the screenshot works, thanks mate! &lt;/P&gt;</description>
      <pubDate>Tue, 22 Jan 2019 06:24:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Extract-full-XML-from-Windows-EventLog-sent-by-UF/m-p/412553#M73031</guid>
      <dc:creator>Cbr1sg</dc:creator>
      <dc:date>2019-01-22T06:24:50Z</dc:date>
    </item>
  </channel>
</rss>

