<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Parsing kaspersky syslog events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Parsing-kaspersky-syslog-events/m-p/553724#M157218</link>
    <description>&lt;P&gt;Thank you very much, that worked perfectly fine.&lt;/P&gt;&lt;P&gt;I was able to reach the same result also using SEDCMD.&lt;/P&gt;&lt;P&gt;Thank you again!&lt;/P&gt;</description>
    <pubDate>Mon, 31 May 2021 15:14:46 GMT</pubDate>
    <dc:creator>martaBenedetti</dc:creator>
    <dc:date>2021-05-31T15:14:46Z</dc:date>
    <item>
      <title>Parsing kaspersky syslog events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Parsing-kaspersky-syslog-events/m-p/553695#M157213</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;&lt;P&gt;I need help in parsing events containing not pure json.&lt;/P&gt;&lt;P&gt;This is the raw event:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;May 28 15:00:15 sd960evo ESS|2.1.0.0 {"User":"SD960EVO\\WinCash","ObjectName":"C:\\PROGRAM FILES\\NCR\\UAHELPER\\XFSTOOL.EXE","Sha256":"6E3B72786B24A85BA657D8298783402DA5237A864ADE989B7B013DEFE65BEDCF","CmdLine":"\"C:\\Program Files\\NCR\\UAHelper\\XFSTool.exe\" \"C:\\Program Files\\NCR APTRA\\Unified Agent\\WS\\bin\\FileUpload\" PIN30\u0000","ParentName":"C:\\Program Files\\NCR\\UAHelper\\UAHelperService.exe\u0000","ProductName":"","FileVersion":"0.0.0.0","EnforcedPolicy":"Deny","DefaultPolicy":"Deny","MatchedRules":"","Issuer":"","Thumbprint":"","Valid":"No","DefaultDeny":"Yes","ActionMask":"-2147483390"}\r\n&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my props.conf&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[kaspersky:syslog]
TIME_PREFIX             = ^
TIME_FORMAT             = %b %d %T

EXTRACT-device          = \w+\s+\d+\s+\d+\:\d+\:\d+\s+(?&amp;lt;device&amp;gt;[^\s]*)\s+.*
EXTRACT-app             = \w+\s+\d+\s+\d+\:\d+\:\d+\s+\S+\s(?&amp;lt;app&amp;gt;[^\s]*)\s+.*

REPORT-json = report-json,report-json-kv&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my transforms.conf file&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[report-json]
# This will get the json payload from the logs.
REGEX = (?P&amp;lt;json1&amp;gt;{.+})

# Manually extract JSON key-value
[report-json-kv]
REGEX = \"(\w+)\":[\s]*\"([^\,\}\"]+)
FORMAT = $1::$2
MV_ADD = true&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tried regex to extract device, app, json1 at search time with rex command and it's working fine.&lt;/P&gt;&lt;P&gt;Do you have any ideas?&lt;/P&gt;&lt;P&gt;Do you have better solution to parse this log?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much&lt;/P&gt;</description>
      <pubDate>Mon, 31 May 2021 08:08:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Parsing-kaspersky-syslog-events/m-p/553695#M157213</guid>
      <dc:creator>martaBenedetti</dc:creator>
      <dc:date>2021-05-31T08:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing kaspersky syslog events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Parsing-kaspersky-syslog-events/m-p/553713#M157216</link>
      <description>&lt;P&gt;Try extracting device and app in the same regex.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;EXTRACT-deviceApp             = \w+\s+\d+\s+\d+\:\d+\:\d+\s+(?&amp;lt;device&amp;gt;\S+)\s(?&amp;lt;app&amp;gt;[^\s]*)\s&lt;/LI-CODE&gt;&lt;P&gt;I don't see the need for the report-json transform.&lt;/P&gt;&lt;P&gt;This transform should handle the key-value parsing.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[report-json-kv]
REGEX = "(\w+)":\s*"((?:[^"\\]|\\.)*)"
FORMAT = $1::$2
MV_ADD = true&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 31 May 2021 13:55:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Parsing-kaspersky-syslog-events/m-p/553713#M157216</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-05-31T13:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing kaspersky syslog events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Parsing-kaspersky-syslog-events/m-p/553724#M157218</link>
      <description>&lt;P&gt;Thank you very much, that worked perfectly fine.&lt;/P&gt;&lt;P&gt;I was able to reach the same result also using SEDCMD.&lt;/P&gt;&lt;P&gt;Thank you again!&lt;/P&gt;</description>
      <pubDate>Mon, 31 May 2021 15:14:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Parsing-kaspersky-syslog-events/m-p/553724#M157218</guid>
      <dc:creator>martaBenedetti</dc:creator>
      <dc:date>2021-05-31T15:14:46Z</dc:date>
    </item>
  </channel>
</rss>

