<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Parse Windows Logs from log source AWS Cloudwatch in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/559593#M92546</link>
    <description>&lt;P&gt;Polishing the config files above. Below conf files worked perfectly for me&lt;/P&gt;&lt;P&gt;#props.conf&lt;BR /&gt;&lt;BR /&gt;[aws:cloudwatch:s3]&lt;BR /&gt;TRANSFORMS-field_extraction_aws_windows_logs = parse_windows_logs_prefix,parse_windows_logs_suffix&lt;/P&gt;&lt;P&gt;#Transforms.conf&lt;BR /&gt;&lt;BR /&gt;[parse_windows_logs_prefix]&lt;BR /&gt;REGEX = \[(?&amp;lt;LogName&amp;gt;.*?)\]\s+\[(?&amp;lt;Type&amp;gt;.*?)\]\s+\[(?P&amp;lt;EventCode&amp;gt;\d+)]\s+\[(?P&amp;lt;SourceName&amp;gt;.*?)\]\s+\[(?P&amp;lt;ComputerName&amp;gt;.*?)]\s+\[(?P&amp;lt;message&amp;gt;[^.]+.)\s(?P&amp;lt;body&amp;gt;[^]]+.)&lt;BR /&gt;FORMAT = LogName::"$1" Type::"$2" EventCode::"$3" Sourcename::"$4" ComputerName::"$5" message::"$6" body::"$7"&lt;BR /&gt;WRITE_META = true&lt;BR /&gt;&lt;BR /&gt;[parse_windows_logs_suffix]&lt;BR /&gt;SOURCE_KEY = field:body&lt;BR /&gt;REGEX = (?m)^\s*(?&amp;lt;name&amp;gt;[^:]+):[\t ]+(?&amp;lt;value&amp;gt;.*)$&lt;BR /&gt;FORMAT = "$1"::"$2"&lt;BR /&gt;REPEAT_MATCH = true&lt;BR /&gt;WRITE_META = true&lt;/P&gt;</description>
    <pubDate>Thu, 15 Jul 2021 13:45:56 GMT</pubDate>
    <dc:creator>pratik_18</dc:creator>
    <dc:date>2021-07-15T13:45:56Z</dc:date>
    <item>
      <title>How to parse Windows logs from log source in AWS CloudWatch via Lambda?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513003#M86991</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I'm sending logs from Windows machines to a log group in CloudWatch that sends to Splunk via Lambda function.&lt;/P&gt;
&lt;P&gt;These logs are arriving in Splunk in the wineventlog sourcetype, but the parse is not correct.&lt;/P&gt;
&lt;P&gt;In the raw source logs, I can view that the logs come in one line, and differently than the parse understands.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Security] [4776] [Microsoft-Windows-Security-Auditing] [XXXXX] [The computer attempted to validate the credentials for an account. Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Logon Account: 000000 Source Workstation: CBBBB Error Code: 0x0]&lt;/LI-CODE&gt;
&lt;P&gt;I've tried to change the sourcetype, the format to&amp;nbsp;CSV, deleted the line_breaker, but until now it does not work.&lt;/P&gt;
&lt;P&gt;Does anyone know how I can parse these kinds of logs coming from log groups in AWS CloudWatch?&lt;/P&gt;
&lt;P&gt;Thank you a lot.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 18:02:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513003#M86991</guid>
      <dc:creator>wvalente</dc:creator>
      <dc:date>2020-08-12T18:02:27Z</dc:date>
    </item>
    <item>
      <title>Re: Parse Windows Logs from log source AWS Cloudwatch</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513016#M86992</link>
      <description>&lt;P&gt;The sample event you posted doesn't have keys ( field names).&amp;nbsp; can you map them to field names and I can write regex for you to extract them and keep in respective field. Regex will work if they are in always same structure.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 14:27:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513016#M86992</guid>
      <dc:creator>thambisetty</dc:creator>
      <dc:date>2020-08-07T14:27:10Z</dc:date>
    </item>
    <item>
      <title>Re: Parse Windows Logs from log source AWS Cloudwatch</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513117#M87009</link>
      <description>&lt;LI-CODE lang="markup"&gt;index=_internal | head 1 | fields _raw _time | eval _raw="[Security] [4776] [Microsoft-Windows-Security-Auditing] [XXXXX] [The computer attempted to validate the credentials for an account. Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Logon Account: 000000 Source Workstation: CBBBB Error Code: 0x0]"
| rex  "\[(?&amp;lt;category&amp;gt;.*?)\]\s\[(?&amp;lt;eventID&amp;gt;.*?)\]\s\[(?&amp;lt;eventlog&amp;gt;.*?)\]\s\[.*?\]\s\[(?&amp;lt;data&amp;gt;.*?)\]"
| rex field=data max_match=0 " (?&amp;lt;fieldname&amp;gt;[A-Z].*?):\s(?&amp;lt;fieldvalue&amp;gt;\S+)"
| eval tmp=mvzip(fieldname,fieldvalue,"="), raw=_raw
| rename tmp as _raw
| kv
| rename raw as _raw
| fields - field* raw&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN class="answer"&gt;Everything was alright in the end.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Aug 2020 00:34:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513117#M87009</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-08-08T00:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: Parse Windows Logs from log source AWS Cloudwatch</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513327#M87052</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your answer.&lt;/P&gt;&lt;P&gt;I try this regex, I modified some parts and works well.&lt;/P&gt;&lt;P&gt;The problem is that all logs&amp;nbsp;from windows is coming in this way. That's is not jus&lt;SPAN&gt;t this log.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Is that any way to use props and transforms or exist a sourcetype specific for this type of log coming from AWS log group?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 12:37:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513327#M87052</guid>
      <dc:creator>wvalente</dc:creator>
      <dc:date>2020-08-10T12:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: Parse Windows Logs from log source AWS Cloudwatch</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513330#M87053</link>
      <description>&lt;P&gt;&lt;A href="https://splunkbase.splunk.com/app/1274/#/overview" target="_blank"&gt;https://splunkbase.splunk.com/app/1274/#/overview&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Have you tried this?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 12:39:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513330#M87053</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-08-10T12:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: Parse Windows Logs from log source AWS Cloudwatch</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513380#M87062</link>
      <description>&lt;P&gt;Yes&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp;. I have this app to parse other types of events coming from AWS.&lt;/P&gt;&lt;P&gt;There is no sourcetype that match with my type of event.&lt;/P&gt;&lt;P&gt;I'm trying to do parsing with splunk within the raw log, but many errors appear.&lt;/P&gt;&lt;P&gt;I'm working on this regex:&lt;/P&gt;&lt;P&gt;\[(?&amp;lt;category&amp;gt;.*?)\]\s+\[(?P&amp;lt;EventCode&amp;gt;\d+)]\s+\[(?P&amp;lt;SourceName&amp;gt;.*?])\s+\[(?P&amp;lt;host&amp;gt;.*?)]\s+\[(?P&amp;lt;subject&amp;gt;[^.]+.)\s([^Account]+)&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 15:06:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513380#M87062</guid>
      <dc:creator>wvalente</dc:creator>
      <dc:date>2020-08-10T15:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: Parse Windows Logs from log source AWS Cloudwatch</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513451#M87074</link>
      <description>&lt;P&gt;reference:&lt;BR /&gt;&lt;A href="https://qiita.com/toshikawa/items/926c63a9f77a0835c94e" target="_blank"&gt;https://qiita.com/toshikawa/items/926c63a9f77a0835c94e&lt;/A&gt;&lt;BR /&gt;my japanese blog&lt;BR /&gt;&lt;BR /&gt;transforms.conf&lt;BR /&gt;&lt;BR /&gt;[your TRANSFORMS stanza]&lt;BR /&gt;SOURCE_KEY = field:data&lt;BR /&gt;REGEX = (?m)^\s*(?&amp;lt;name&amp;gt;[^:]+):[\t ]+(?&amp;lt;value&amp;gt;.*)$&lt;BR /&gt;FORMAT = "$1"::$2&lt;BR /&gt;REPEAT_MATCH = true&lt;BR /&gt;WRITE_META = true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this transforms.conf setting is aim to extract fields from&amp;nbsp;&lt;STRONG&gt;data &lt;/STRONG&gt;field.&lt;BR /&gt;&lt;BR /&gt;[yours]&lt;BR /&gt;&lt;SPAN&gt;REGEX = \[(?&amp;lt;category&amp;gt;.*?)\]\s+\[(?P&amp;lt;EventCode&amp;gt;\d+)]\s+\[(?P&amp;lt;SourceName&amp;gt;.*?])\s+\[(?P&amp;lt;host&amp;gt;.*?)]\s+\[(?P&amp;lt;subject&amp;gt;[^.]+.)\s(?P&amp;lt;data&amp;gt;.*)&lt;BR /&gt;WRITE_META = true&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;it needs this, too.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 21:54:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513451#M87074</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-08-10T21:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: Parse Windows Logs from log source AWS Cloudwatch</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513665#M87100</link>
      <description>&lt;P&gt;Not sure on your current Splunk set up, but I have done this recently using Splunk Cloud and for AWS Microsoft AD, but not using Lambda, rather the Splunk Add-on for AWS. I configured the inputs as CloudWatch Logs. Logs are parsed correctly though I am missing things such as eventtypes.&lt;/P&gt;&lt;P&gt;I was also looking at giving Trumpet a go &lt;A href="https://github.com/splunk/splunk-aws-project-trumpet" target="_blank"&gt;https://github.com/splunk/splunk-aws-project-trumpet&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 06:24:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513665#M87100</guid>
      <dc:creator>lznger88_2</dc:creator>
      <dc:date>2020-08-12T06:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: Parse Windows Logs from log source AWS Cloudwatch</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513718#M87110</link>
      <description>&lt;P&gt;I see your point.&lt;/P&gt;&lt;P&gt;But even if I send to the aws:cloudwatchlogs the parse is not correct.&lt;/P&gt;&lt;P&gt;I read the github and the method is similar to the lambda, via HEC.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 14:13:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513718#M87110</guid>
      <dc:creator>wvalente</dc:creator>
      <dc:date>2020-08-12T14:13:41Z</dc:date>
    </item>
    <item>
      <title>Re: Parse Windows Logs from log source AWS Cloudwatch</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513825#M87121</link>
      <description>&lt;P&gt;Do you have the Splunk Add-on for windows installed on your SH and IDX?&lt;/P&gt;&lt;P&gt;I've sent the Microsoft AD logs to&amp;nbsp;aws:cloudwatchlogs:vpcflow. Though better practice would have to been to use a Kinesis stream.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 00:34:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/513825#M87121</guid>
      <dc:creator>lznger88_2</dc:creator>
      <dc:date>2020-08-13T00:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: Parse Windows Logs from log source AWS Cloudwatch</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/559593#M92546</link>
      <description>&lt;P&gt;Polishing the config files above. Below conf files worked perfectly for me&lt;/P&gt;&lt;P&gt;#props.conf&lt;BR /&gt;&lt;BR /&gt;[aws:cloudwatch:s3]&lt;BR /&gt;TRANSFORMS-field_extraction_aws_windows_logs = parse_windows_logs_prefix,parse_windows_logs_suffix&lt;/P&gt;&lt;P&gt;#Transforms.conf&lt;BR /&gt;&lt;BR /&gt;[parse_windows_logs_prefix]&lt;BR /&gt;REGEX = \[(?&amp;lt;LogName&amp;gt;.*?)\]\s+\[(?&amp;lt;Type&amp;gt;.*?)\]\s+\[(?P&amp;lt;EventCode&amp;gt;\d+)]\s+\[(?P&amp;lt;SourceName&amp;gt;.*?)\]\s+\[(?P&amp;lt;ComputerName&amp;gt;.*?)]\s+\[(?P&amp;lt;message&amp;gt;[^.]+.)\s(?P&amp;lt;body&amp;gt;[^]]+.)&lt;BR /&gt;FORMAT = LogName::"$1" Type::"$2" EventCode::"$3" Sourcename::"$4" ComputerName::"$5" message::"$6" body::"$7"&lt;BR /&gt;WRITE_META = true&lt;BR /&gt;&lt;BR /&gt;[parse_windows_logs_suffix]&lt;BR /&gt;SOURCE_KEY = field:body&lt;BR /&gt;REGEX = (?m)^\s*(?&amp;lt;name&amp;gt;[^:]+):[\t ]+(?&amp;lt;value&amp;gt;.*)$&lt;BR /&gt;FORMAT = "$1"::"$2"&lt;BR /&gt;REPEAT_MATCH = true&lt;BR /&gt;WRITE_META = true&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jul 2021 13:45:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-parse-Windows-logs-from-log-source-in-AWS-CloudWatch-via/m-p/559593#M92546</guid>
      <dc:creator>pratik_18</dc:creator>
      <dc:date>2021-07-15T13:45:56Z</dc:date>
    </item>
  </channel>
</rss>

