<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MS SQL Audit files not parsing in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/689961#M12002</link>
    <description>&lt;P&gt;&lt;SPAN&gt;I suspect that the MSSQL TA is normally supported and works in-conjuncton with the DB addon for sourcetype formatting (So it uses SQL queries and then does the props and transforms part, hence you’re not seeing and values. So, I suspect it’s not being parsed correctly. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For the Windows Logs you normally use the Windows TA which contains the props and transforms from the standard Windows Events channels(app/information/security etc) and the TA contains the parsing code.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I don’t have a test environment, so can't check, but you could try. &lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN&gt;Change your sourcetype as there is a typo = mssql:aud to sourcetype = mssql:audit - and see of that works. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Perhaps set renderXml = true in the inputs.conf with new sourectype mssql:aud:xml and create a props.conf with the mssql:aud:xml sourcetype add KV_MODE=xml (this is just a try and see without testing)&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;If that doesn't work then stick with the DB connect solution.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 07 Jun 2024 11:32:11 GMT</pubDate>
    <dc:creator>deepakc</dc:creator>
    <dc:date>2024-06-07T11:32:11Z</dc:date>
    <item>
      <title>MS SQL Audit files not parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/689947#M12001</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi all,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I am trying to integrate&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;MS SQL&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;audit log data with a&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;UF&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;instead of DB Connect.&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;What is the best and recommended way to do it that maps all fields?&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;At the moment it is integrated with the UF and using the "&lt;/SPAN&gt;&lt;A class="" href="https://docs.splunk.com/Documentation/AddOns/latest/MSSQLServer" target="_blank" rel="noopener noreferrer"&gt;Splunk Add-on for Microsoft SQL Server&lt;/A&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Also i am seeing one additional dummy event(no values nothing blank event) with every event that is coming&lt;BR /&gt;&lt;BR /&gt;My Inputs.conf&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog://Security]
start_from = oldest
current_only = 0
checkpointInterval = 5
whitelist1 = 33205
index = test_mssql
renderXml=false
sourcetype = mssql:aud
disabled = 0&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 09:28:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/689947#M12001</guid>
      <dc:creator>rahulhari88</dc:creator>
      <dc:date>2024-06-07T09:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: MS SQL Audit files not parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/689961#M12002</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I suspect that the MSSQL TA is normally supported and works in-conjuncton with the DB addon for sourcetype formatting (So it uses SQL queries and then does the props and transforms part, hence you’re not seeing and values. So, I suspect it’s not being parsed correctly. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For the Windows Logs you normally use the Windows TA which contains the props and transforms from the standard Windows Events channels(app/information/security etc) and the TA contains the parsing code.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I don’t have a test environment, so can't check, but you could try. &lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN&gt;Change your sourcetype as there is a typo = mssql:aud to sourcetype = mssql:audit - and see of that works. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Perhaps set renderXml = true in the inputs.conf with new sourectype mssql:aud:xml and create a props.conf with the mssql:aud:xml sourcetype add KV_MODE=xml (this is just a try and see without testing)&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;If that doesn't work then stick with the DB connect solution.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 11:32:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/689961#M12002</guid>
      <dc:creator>deepakc</dc:creator>
      <dc:date>2024-06-07T11:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: MS SQL Audit files not parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/689963#M12003</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/79189"&gt;@deepakc&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I was checking if i can use SECMD to remove that blank event . However i am not sure how to use it ?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Or try this&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.splunk.com/t5/Splunk-Search/Why-is-the-regex-creating-empty-events-from-incoming-data/m-p/396432" target="_blank" rel="noopener"&gt;https://community.splunk.com/t5/Splunk-Search/Why-is-the-regex-creating-empty-events-from-incoming-data/m-p/396432&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The previous event ends with a "." so can i try the above method ?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jun 2024 05:55:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/689963#M12003</guid>
      <dc:creator>rahulhari88</dc:creator>
      <dc:date>2024-06-08T05:55:57Z</dc:date>
    </item>
    <item>
      <title>Re: MS SQL Audit files not parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/690023#M12004</link>
      <description>&lt;P&gt;The Sedcmd is mainly used to transform the raw data mask or delete lines etc not the event, so I don't think it would work ( I can't test) and I don't think you can use SEDCMD on the UF level.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The option you may have is to use send data with no data to the null queue, so worth a go.&lt;/P&gt;&lt;P&gt;Configure the below and deploy on the indexer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This would send any data with no data to null queue (again I don't have a test environment, so you will have to trail and error it)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;props.conf (Add your sourcetype here)&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[wineventlog]
TRANSFORMS-my_windows_blank_events = setnull&lt;/LI-CODE&gt;&lt;P&gt;transforms.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = ^\s*$
DEST_KEY = queue
FORMAT = nullQueue&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 15:41:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/690023#M12004</guid>
      <dc:creator>deepakc</dc:creator>
      <dc:date>2024-06-07T15:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: MS SQL Audit files not parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/690066#M12005</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/79189"&gt;@deepakc&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Actually we are using Splunk Cloud so no indexer . However we are sending the UF to an HF and then to Splunk Cloud ,so i believe we can test this on the HF and see .Also i realized that second empty event does have date and time being captured ,so practically its not empty event , it just does not have any valuable info .So based on your method i am planning to use this config .Hope this works ? But i have one doubt where in HF should i place it .Since its only function is to drop events .Is it in /opt/splunk/etc/system or in the&amp;nbsp;/opt/splunk/etc/apps ?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;# props.conf
[sql:audit]
TRANSFORMS-null_events = strip_null_events

# transforms.conf
[strip_null_events]
REGEX = ^\d{2}/\d{2}/\d{4} \d{1,2}:\d{2}:\d{2} [AP]M$
DEST_KEY = queue
FORMAT = nullQueue&lt;/LI-CODE&gt;</description>
      <pubDate>Sat, 08 Jun 2024 08:02:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/690066#M12005</guid>
      <dc:creator>rahulhari88</dc:creator>
      <dc:date>2024-06-08T08:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: MS SQL Audit files not parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/690067#M12006</link>
      <description>&lt;P&gt;On the HF place the file on there (Easy)&lt;/P&gt;&lt;P&gt;/opt/splunk/etc/system/local/props.conf&lt;BR /&gt;/opt/splunk/etc/system/local/transforms.conf&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;If you know how to create a custom TA app, then that's better - this will give you a start - but you need to understand the app structure&lt;BR /&gt;&lt;A href="https://dev.splunk.com/enterprise/tutorials/quickstart_old/createyourfirstapp/" target="_blank"&gt;https://dev.splunk.com/enterprise/tutorials/quickstart_old/createyourfirstapp/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;If you manage to create the app, then place it in /opt/splunk/etc/apps/ on the HF&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jun 2024 07:01:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-Audit-files-not-parsing/m-p/690067#M12006</guid>
      <dc:creator>deepakc</dc:creator>
      <dc:date>2024-06-08T07:01:09Z</dc:date>
    </item>
  </channel>
</rss>

