<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Monitoring MS SQL logs from Windows Event viewer in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439036#M5857</link>
    <description>&lt;P&gt;Did you happen to share that addon anywhere?&lt;/P&gt;</description>
    <pubDate>Wed, 18 Dec 2019 17:07:50 GMT</pubDate>
    <dc:creator>hughkelley</dc:creator>
    <dc:date>2019-12-18T17:07:50Z</dc:date>
    <item>
      <title>Monitoring MS SQL logs from Windows Event viewer</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439031#M5852</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;We need to integrate MS SQL logs with Splunk. The current default add-on supports logs via DB Connect but we do not have database connectivity directly. Rather, all the logs are written in Application logs for Windows Event viewer with most of the details in the Message field.&lt;/P&gt;

&lt;P&gt;Currently all the fields are not being parsed, please suggest how can we integrate the same.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 13:20:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439031#M5852</guid>
      <dc:creator>akshatj2</dc:creator>
      <dc:date>2018-09-03T13:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring MS SQL logs from Windows Event viewer</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439032#M5853</link>
      <description>&lt;P&gt;Same challenge here,  I had this add-on would have parsing rules for SQL audit data in Windows Event Logs.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/AddOns/released/MSSQLServer/Datatypes"&gt;https://docs.splunk.com/Documentation/AddOns/released/MSSQLServer/Datatypes&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 20:39:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439032#M5853</guid>
      <dc:creator>hughkelley</dc:creator>
      <dc:date>2019-10-24T20:39:40Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring MS SQL logs from Windows Event viewer</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439033#M5854</link>
      <description>&lt;P&gt;We had the same challenge here is what we ended up doing:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Get your DBA to deploy database and server audit objects for the events you want to monitor.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/sql/relational-databases/security/auditing/create-a-server-audit-and-server-audit-specification?view=sql-server-2017"&gt;https://docs.microsoft.com/en-us/sql/relational-databases/security/auditing/create-a-server-audit-and-server-audit-specification?view=sql-server-2017&lt;/A&gt;&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Have those events sent to Win Event Log under Application&lt;/LI&gt;
&lt;LI&gt;Deploy a UF on the SQL servers to collect all the Win Event Logs.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Thu, 24 Oct 2019 20:53:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439033#M5854</guid>
      <dc:creator>chans28</dc:creator>
      <dc:date>2019-10-24T20:53:29Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring MS SQL logs from Windows Event viewer</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439034#M5855</link>
      <description>&lt;P&gt;We can get the logs into Splunk.   I'm particularly asking about the peculiar log format of the audit data.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Audit event: audit_schema_version:1
event_time:2019-10-23 20:57:13.1337990
sequence_number:1
action_id:LGIF
succeeded:false
is_column_permission:false
session_id:0
server_principal_id:0
database_principal_id:0
target_server_principal_id:0
target_database_principal_id:0
object_id:0
user_defined_event_id:0
transaction_id:0
class_type:LX
duration_milliseconds:0
response_rows:0
affected_rows:0
client_ip:10.99.99.999
permission_bitmask:00000000000000000000000000000000
sequence_group_id:954EDDBB-F5A2-45B2-AAC5-2E9797EC3859
session_server_principal_name:
server_principal_name:iamfake
server_principal_sid:
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 24 Oct 2019 20:59:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439034#M5855</guid>
      <dc:creator>hughkelley</dc:creator>
      <dc:date>2019-10-24T20:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring MS SQL logs from Windows Event viewer</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439035#M5856</link>
      <description>&lt;P&gt;Oh I see. My apologies. So we had to throw away the SQL Server addon and just build our own CIM compliant addon. We used action_id, class_type and succeeded to map to Authentication CIM.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 02:41:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439035#M5856</guid>
      <dc:creator>chans28</dc:creator>
      <dc:date>2020-09-30T02:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring MS SQL logs from Windows Event viewer</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439036#M5857</link>
      <description>&lt;P&gt;Did you happen to share that addon anywhere?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2019 17:07:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/439036#M5857</guid>
      <dc:creator>hughkelley</dc:creator>
      <dc:date>2019-12-18T17:07:50Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring MS SQL logs from Windows Event viewer</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/527210#M9422</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/1732"&gt;@hughkelley&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;How did you resolve this issue, any idea?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 06:04:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/527210#M9422</guid>
      <dc:creator>hectorvp</dc:creator>
      <dc:date>2020-10-30T06:04:04Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring MS SQL logs from Windows Event viewer</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/527277#M9423</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/223614"&gt;@hectorvp&lt;/a&gt;,&amp;nbsp; we never fully got it working.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is where we ended up.&amp;nbsp;&amp;nbsp; The idea was to extract the SQL detail into the zzz field and then split it out from there.&amp;nbsp; I'm still trying to remember what didn't work about this but can't find my notes.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://regex101.com/r/vrb7OK/1" target="_blank"&gt;https://regex101.com/r/vrb7OK/1&lt;/A&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;#inputs.conf
renderXml = true


#props.conf
[SQL-Audit-via-xml]
# search time extractions
EXTRACT-xmleventdata = \&amp;lt;Data\&amp;gt;(?&amp;lt;zzz_sql_audit_data&amp;gt;.+?)\&amp;lt;\/Data\&amp;gt;
REPORT-000 = wel-col-kv-sqlaudit-atsearch

#transforms.conf
[wel-col-kv-sqlaudit-atsearch]
SOURCE_KEY = zzz_sql_audit_data
REGEX      = ([a-z_]+):(.*?)[\r\n]+
FORMAT     = $1::$2&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 11:20:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/527277#M9423</guid>
      <dc:creator>hughkelley</dc:creator>
      <dc:date>2020-10-30T11:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring MS SQL logs from Windows Event viewer</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/560512#M10085</link>
      <description>&lt;P&gt;Does that regular expression work for you?&lt;/P&gt;&lt;PRE&gt;\&amp;lt;Data\&amp;gt;(?&amp;lt;zzz_sql_audit_data&amp;gt;.+?)\&amp;lt;\/Data\&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;I have not been able to get it to work.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 18:36:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/560512#M10085</guid>
      <dc:creator>jaredthomason</dc:creator>
      <dc:date>2021-07-22T18:36:10Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring MS SQL logs from Windows Event viewer</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/560521#M10087</link>
      <description>&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;Which .conf files are you editing? Is it in a specific app on the SQL server or an app on the indexer?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 20:08:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/560521#M10087</guid>
      <dc:creator>jaredthomason</dc:creator>
      <dc:date>2021-07-22T20:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring MS SQL logs from Windows Event viewer</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/561032#M10102</link>
      <description>&lt;P&gt;I had to change the first regular expression to the following.&lt;/P&gt;&lt;P&gt;\&amp;lt;Data\&amp;gt;(?&amp;lt;zzz_sql_audit_data&amp;gt;[^*]*)\&amp;lt;\/Data\&amp;gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2021 14:19:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Monitoring-MS-SQL-logs-from-Windows-Event-viewer/m-p/561032#M10102</guid>
      <dc:creator>jaredthomason</dc:creator>
      <dc:date>2021-07-27T14:19:36Z</dc:date>
    </item>
  </channel>
</rss>

