<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extract fields from Windows Event Log Message in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363191#M160565</link>
    <description>&lt;P&gt;do you have the TA on the indexer as well?&lt;/P&gt;</description>
    <pubDate>Sun, 25 Jun 2017 22:13:57 GMT</pubDate>
    <dc:creator>adonio</dc:creator>
    <dc:date>2017-06-25T22:13:57Z</dc:date>
    <item>
      <title>Extract fields from Windows Event Log Message</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363186#M160560</link>
      <description>&lt;P&gt;I have events that do not extract the fields from the message field by default.  I'm trying to setup props/transforms to auto extract the fields on search.  I believe I have the props and transforms setup properly however it's not working.  I think the issue is the regex I'm using and possibly the first 2 lines of the message data.&lt;/P&gt;

&lt;P&gt;Props:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::WinEventLog:Directory Service]
REPORT-dsfields = ds_fields
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Transforms:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[ds_fields]
SOURCE_KEY = Message
REGEX = ([^:]+):\n(.*[\S])
FORMAT = $1::$2
MV_ADD = true
KEEP_EMPTY_VALS = true
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The regex appears to extract the fields properly with the  exception of the first line which I don't need.  I also tried this regex&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(?:.*\n){2}([^:]+):\n(.*[\S])
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Which also appears to work to exclude the first two lines.  However the combination doesn't extract fields when searching.  If I extract a single value in the same props and transforms it works so I believe the files are configured properly.&lt;/P&gt;

&lt;P&gt;I don't care if the first line (Internal Event:) is extracted or not.  The goal is to extract the field value pairs in the rest of the message.&lt;/P&gt;

&lt;P&gt;The message field data looks like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Internal event: A client issued a search operation with the following options. 

Client:
10.215.215.215:61759 
Starting node:
DC=domain,DC=Domain,DC=Domain,DC=local 
Filter:
 (accountNameHistory=*[DG]*)  
Search scope:
subtree 
Attribute selection:
accountNameHistory,employeeType,title,info,groupType,distinguishedName,objectGUID,sAMAccountType,departmentNumber,memberOf,objectSid,objectClass
Server controls:

Visited entries:
1556 
Returned entries:
8 
Used indexes:
Ancestors_index:3356:N; 
Pages referenced:
16745 
Pages read from disk:
31 
Pages preread from disk:
9 
Clean pages modified:
0 
Dirty pages modified:
0 
Search time (ms):
313 
Attributes Preventing Optimization:
accountNameHistory  
User:
Domain\some-user-account
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 24 Jun 2017 02:55:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363186#M160560</guid>
      <dc:creator>dw385</dc:creator>
      <dc:date>2017-06-24T02:55:34Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from Windows Event Log Message</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363187#M160561</link>
      <description>&lt;P&gt;I changed the text of the event code to "code" so the asterisks won't be converted to italics.  It did not change the carriage returns, but I don't know if this is the way it is supposed to be.  Can you confirm it still looks like the event as you see it in the original place? &lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jun 2017 22:19:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363187#M160561</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-06-24T22:19:31Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from Windows Event Log Message</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363188#M160562</link>
      <description>&lt;P&gt;Thank you, the example looks correct.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2017 01:40:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363188#M160562</guid>
      <dc:creator>dw385</dc:creator>
      <dc:date>2017-06-25T01:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from Windows Event Log Message</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363189#M160563</link>
      <description>&lt;P&gt;hello there,&lt;BR /&gt;
the configurations you need are pre-built and packaged nicely on the Splunk_TA_microsoft_ad&lt;BR /&gt;
download here: &lt;A href="https://splunkbase.splunk.com/app/3207/" target="_blank"&gt;https://splunkbase.splunk.com/app/3207/&lt;/A&gt;&lt;BR /&gt;
install it on the forwarder of your domain controller and you can remove the props and transforms&lt;BR /&gt;
read more here:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/MSApp/1.4.1/MSInfra/WhataSplunkAppforWindowsInfrastructuredeploymentlookslike" target="_blank"&gt;http://docs.splunk.com/Documentation/MSApp/1.4.1/MSInfra/WhataSplunkAppforWindowsInfrastructuredeploymentlookslike&lt;/A&gt;&lt;BR /&gt;
and here:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/MSApp/1.4.1/MSInfra/ConfigureActiveDirectoryauditpolicy" target="_blank"&gt;http://docs.splunk.com/Documentation/MSApp/1.4.1/MSInfra/ConfigureActiveDirectoryauditpolicy&lt;/A&gt;&lt;BR /&gt;
hope it helps&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:34:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363189#M160563</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2020-09-29T14:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from Windows Event Log Message</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363190#M160564</link>
      <description>&lt;P&gt;I have that deployed to my DCs and on the SHs.  The data is collected but some of the logs in Directory Services is in a header over value format.  It seems none of values are extracted properly (not just for this particular event I need).  I don't think I see anything in the AD TA that seems to suggest there is anything for extracting the fields from the message.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2017 21:04:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363190#M160564</guid>
      <dc:creator>dw385</dc:creator>
      <dc:date>2017-06-25T21:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from Windows Event Log Message</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363191#M160565</link>
      <description>&lt;P&gt;do you have the TA on the indexer as well?&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2017 22:13:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363191#M160565</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2017-06-25T22:13:57Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from Windows Event Log Message</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363192#M160566</link>
      <description>&lt;P&gt;Yes, it's on the indexers as well.  Latest version (1.0) with no customization to it.  This is the same for the Windows TA as well, although not the latest version, I am a release or two behind on that one.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2017 10:29:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363192#M160566</guid>
      <dc:creator>dw385</dc:creator>
      <dc:date>2017-06-26T10:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from Windows Event Log Message</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363193#M160567</link>
      <description>&lt;P&gt;can you verify the source of the data you are trying to transform?&lt;BR /&gt;
i see in the exchange app i have access to that the source is "Directory_Service" and not &lt;BR /&gt;
"Directory Service"&lt;BR /&gt;
 in any case, its odd, i see all extractions working fine on the environment i have access to &lt;BR /&gt;
hope it helps&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2017 12:02:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-Windows-Event-Log-Message/m-p/363193#M160567</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2017-06-26T12:02:33Z</dc:date>
    </item>
  </channel>
</rss>

