<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extracting fields from imported Windows Event Logs (text format) in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51677#M12530</link>
    <description>&lt;P&gt;Cheers, I'll give that a try (although I think I did override the source, resulting in the host extraction via 'host_segment' not working). I'll test it and let you know.&lt;/P&gt;</description>
    <pubDate>Sat, 31 Aug 2013 01:32:51 GMT</pubDate>
    <dc:creator>rturk</dc:creator>
    <dc:date>2013-08-31T01:32:51Z</dc:date>
    <item>
      <title>Extracting fields from imported Windows Event Logs (text format)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51672#M12525</link>
      <description>&lt;P&gt;Hi Splunkers &amp;amp; Splunkettes,&lt;/P&gt;

&lt;P&gt;I have a Splunk Indexer/Search Head running on a WIndows platform and I'm trying to import a text file containing archived Windows Event Log (Application) events as you would any other type of log file.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[monitor://&amp;lt;path_to_file&amp;gt;/WindowsEventLog_Application.txt]
followTail = 0
host_segment = 3
index = winevents
sourcetype = WinEventLog:Application
queue = parsingQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The issue is, no field extractions take place for the events I put in by this method, but they &lt;EM&gt;do&lt;/EM&gt; work for events collected locally via the &lt;CODE&gt;[WindowsEventLog:Application]&lt;/CODE&gt; in the &lt;CODE&gt;inputs.conf&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;So despite both:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Have the same sourcetype (&lt;CODE&gt;WinEventLog:Application&lt;/CODE&gt;)&lt;/LI&gt;
&lt;LI&gt;Are in the same index&lt;/LI&gt;
&lt;LI&gt;Are accessed &amp;amp; visible in the same app&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;One works (the local event log interrogation), and one doesn't (mine :P)&lt;/P&gt;

&lt;P&gt;I'd rather not reinvent the wheel and create all new props &amp;amp; transforms, when it's obviously in there and working for other data.&lt;/P&gt;

&lt;P&gt;Any ideas?&lt;/P&gt;

&lt;P&gt;PS. Splunk has been restarted.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2013 02:00:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51672#M12525</guid>
      <dc:creator>rturk</dc:creator>
      <dc:date>2013-08-30T02:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting fields from imported Windows Event Logs (text format)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51673#M12526</link>
      <description>&lt;P&gt;So I've made a bit of a work-around, but I'd still be interested to know why an existing sourcetype doesn't apply to my data when they are the same.&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WindowsEventLog:Application]
REPORT-header_kv_extract = WinEventLog-kv_colon
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog-kv_colon]
REGEX = ^\s{2}([^:]+):\s+([^\n]+)
FORMAT = $1::$2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This performed my key/value extractions (for the time being).&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2013 04:12:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51673#M12526</guid>
      <dc:creator>rturk</dc:creator>
      <dc:date>2013-08-30T04:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting fields from imported Windows Event Logs (text format)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51674#M12527</link>
      <description>&lt;P&gt;Well, you can see the extractions in the $SPLUNK_HOME/etc/system/default/props.conf. If you look there, you'll see that the extractions are based not on the sourcetype, but on the source. Since your source is different, it doesn't work. Now, you could also make it work by overriding your source with a "source = WinEventLog:Application" setting in inputs.conf. Though probably you don't want to.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2013 05:36:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51674#M12527</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2013-08-30T05:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting fields from imported Windows Event Logs (text format)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51675#M12528</link>
      <description>&lt;P&gt;I assume it's a typo that you have &lt;CODE&gt;WindowsEventLog&lt;/CODE&gt; in your stanza header rather than &lt;CODE&gt;WinEventLog&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2013 05:37:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51675#M12528</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2013-08-30T05:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting fields from imported Windows Event Logs (text format)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51676#M12529</link>
      <description>&lt;P&gt;Yep that's a typo (couldn't copy &amp;amp; paste as I was on another server)&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2013 01:31:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51676#M12529</guid>
      <dc:creator>rturk</dc:creator>
      <dc:date>2013-08-31T01:31:19Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting fields from imported Windows Event Logs (text format)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51677#M12530</link>
      <description>&lt;P&gt;Cheers, I'll give that a try (although I think I did override the source, resulting in the host extraction via 'host_segment' not working). I'll test it and let you know.&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2013 01:32:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-imported-Windows-Event-Logs-text-format/m-p/51677#M12530</guid>
      <dc:creator>rturk</dc:creator>
      <dc:date>2013-08-31T01:32:51Z</dc:date>
    </item>
  </channel>
</rss>

