<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Field extrations from XmlWinEventLog in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Field-extrations-from-XmlWinEventLog/m-p/373520#M161150</link>
    <description>&lt;P&gt;Hmm, the Splunk Add on for Windows contains field extractions for Windows-based XML logs in both the props and transforms. Are you using this app? &lt;A href="https://splunkbase.splunk.com/app/742/"&gt;https://splunkbase.splunk.com/app/742/&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 11 May 2017 16:01:48 GMT</pubDate>
    <dc:creator>adayton20</dc:creator>
    <dc:date>2017-05-11T16:01:48Z</dc:date>
    <item>
      <title>Field extrations from XmlWinEventLog</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extrations-from-XmlWinEventLog/m-p/373517#M161147</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
I've been trying to find a good solution to extract fields from some XML windows event logs.&lt;BR /&gt;
For instance &lt;CODE&gt;sourcetype="xmlwineventlog:microsoft-windows-base-filtering-engine-connections/operational"&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;A record from this might look like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;?xml version="1.0"?&amp;gt;
&amp;lt;Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"&amp;gt;
  &amp;lt;System&amp;gt;
    &amp;lt;Provider Name="Microsoft-Windows-Base-Filtering-Engine-Connections" Guid="{guid removed}"/&amp;gt;
    &amp;lt;EventID&amp;gt;2001&amp;lt;/EventID&amp;gt;
    &amp;lt;Version&amp;gt;0&amp;lt;/Version&amp;gt;
    &amp;lt;Level&amp;gt;4&amp;lt;/Level&amp;gt;
    &amp;lt;Task&amp;gt;0&amp;lt;/Task&amp;gt;
    &amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;
    &amp;lt;Keywords&amp;gt;0x8000000000000000&amp;lt;/Keywords&amp;gt;
    &amp;lt;TimeCreated SystemTime="2017-05-11T08:31:38.735136100Z"/&amp;gt;
    &amp;lt;EventRecordID&amp;gt;1173869&amp;lt;/EventRecordID&amp;gt;
    &amp;lt;Correlation/&amp;gt;
    &amp;lt;Execution ProcessID="1152" ThreadID="9924"/&amp;gt;
    &amp;lt;Channel&amp;gt;Microsoft-Windows-Base-Filtering-Engine-Connections/Operational&amp;lt;/Channel&amp;gt;
    &amp;lt;Computer&amp;gt;hostname.removed&amp;lt;/Computer&amp;gt;
    &amp;lt;Security UserID="removed"/&amp;gt;
  &amp;lt;/System&amp;gt;
  &amp;lt;EventData&amp;gt;
    &amp;lt;Data Name="ConnectionId"&amp;gt;13138485797994339311&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="MachineAuthenticationMethod"&amp;gt;4&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="RemoteMachineAccount"&amp;gt;remote, machine, account, removed&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="UserAuthenticationMethod"&amp;gt;5&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="RemoteUserAcount"&amp;gt;domain\user&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="RemoteIPAddress"&amp;gt;IPv6addr removed&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="LocalIPAddress"&amp;gt;local IPv6addr removed&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="TechnologyProviderKey"&amp;gt;{1BEBC969-61A5-4732-A177-847A0817862A}&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="IPsecTrafficMode"&amp;gt;1&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="BytesTransferredInbound"&amp;gt;10128&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="BytesTransferredOutbound"&amp;gt;10528&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="BytesTransferredTotal"&amp;gt;20656&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="StartTime"&amp;gt;2017-05-11T08:30:03.155Z&amp;lt;/Data&amp;gt;
    &amp;lt;Data Name="CloseTime"&amp;gt;2017-05-11T08:31:38.724Z&amp;lt;/Data&amp;gt;
  &amp;lt;/EventData&amp;gt;
&amp;lt;/Event&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In this case it is the &lt;CODE&gt;&amp;lt;Data name="whatever"&amp;gt;blah&amp;gt;/Data&amp;gt;&lt;/CODE&gt; fields that are most interesting to extract.&lt;BR /&gt;
I've tried &lt;CODE&gt;KV_MODE=xml&lt;/CODE&gt;, but that does not parse anything, neither does xmlkv, which perhaps isn't a surprise.&lt;/P&gt;

&lt;P&gt;So any suggestions on the easiest way to parse this? I'd prefer not to have to manually define the fields, since there are several different sourcetypes I need to do this for.&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 08:58:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extrations-from-XmlWinEventLog/m-p/373517#M161147</guid>
      <dc:creator>hcpr</dc:creator>
      <dc:date>2017-05-11T08:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: Field extrations from XmlWinEventLog</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extrations-from-XmlWinEventLog/m-p/373518#M161148</link>
      <description>&lt;P&gt;You might try &lt;CODE&gt;renderXml=true&lt;/CODE&gt; in your inputs.conf file beneath the stanza for that sourcetype, under the app you're working with.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 09:44:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extrations-from-XmlWinEventLog/m-p/373518#M161148</guid>
      <dc:creator>adayton20</dc:creator>
      <dc:date>2017-05-11T09:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: Field extrations from XmlWinEventLog</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extrations-from-XmlWinEventLog/m-p/373519#M161149</link>
      <description>&lt;P&gt;I forgot to mention that .&lt;BR /&gt;
I have &lt;CODE&gt;renderXML=true&lt;/CODE&gt; in the inputs. So I get the XML data, just looking for the best way to extract all the fields automatically.&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 10:29:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extrations-from-XmlWinEventLog/m-p/373519#M161149</guid>
      <dc:creator>hcpr</dc:creator>
      <dc:date>2017-05-11T10:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: Field extrations from XmlWinEventLog</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extrations-from-XmlWinEventLog/m-p/373520#M161150</link>
      <description>&lt;P&gt;Hmm, the Splunk Add on for Windows contains field extractions for Windows-based XML logs in both the props and transforms. Are you using this app? &lt;A href="https://splunkbase.splunk.com/app/742/"&gt;https://splunkbase.splunk.com/app/742/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 16:01:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extrations-from-XmlWinEventLog/m-p/373520#M161150</guid>
      <dc:creator>adayton20</dc:creator>
      <dc:date>2017-05-11T16:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: Field extrations from XmlWinEventLog</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extrations-from-XmlWinEventLog/m-p/373521#M161151</link>
      <description>&lt;P&gt;Did you find any solution to this? I'm using the TA for Windows, which collects XmlWinEventLog with renderXml=true and does a lot of report stuff in props.conf, but still there are no field extractions on the searh head.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2018 12:15:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extrations-from-XmlWinEventLog/m-p/373521#M161151</guid>
      <dc:creator>hettervik</dc:creator>
      <dc:date>2018-02-09T12:15:55Z</dc:date>
    </item>
  </channel>
</rss>

