<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with Windows Security logs field extractor in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217882#M188007</link>
    <description>&lt;P&gt;My answer creates a &lt;CODE&gt;multi-valued&lt;/CODE&gt; field that can have many values, one for each item in the list.  The double-newline terminator indicates the end of the list.  Just try it.&lt;/P&gt;</description>
    <pubDate>Fri, 24 Jun 2016 16:43:35 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2016-06-24T16:43:35Z</dc:date>
    <item>
      <title>Problem with Windows Security logs field extractor</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217879#M188004</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;

&lt;P&gt;I'm auditing a file server of my domain (access, read, write...) with Windows event logs and Splunk, and it is rather functional.&lt;/P&gt;

&lt;P&gt;However I have a problem with the "intelligent file extraction". &lt;BR /&gt;
A standard collected security log has the following structure: &lt;/P&gt;

&lt;P&gt;06/23/2016 03:08:11 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=5145&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=&lt;BR /&gt;
TaskCategory=Partage de fichiers détaillé &lt;BR /&gt;
OpCode=Informations&lt;BR /&gt;
RecordNumber=20907498&lt;BR /&gt;
Keywords=Succès de l’audit&lt;BR /&gt;
Message=Un objet du partage réseau a été vérifié afin de savoir si l’accès souhaité peut être accordé au client.&lt;/P&gt;

&lt;P&gt;Sujet :&lt;BR /&gt;
    ID de sécurité :      ...&lt;BR /&gt;
    Nom du compte :     Someone&lt;BR /&gt;
    Domaine du compte :     ...&lt;BR /&gt;
    ID d’ouverture de session :       ...&lt;/P&gt;

&lt;P&gt;Informations sur le réseau :&lt;BR /&gt;&lt;BR /&gt;
    Type d’objet :        File&lt;BR /&gt;
    Adresse source :        ...&lt;BR /&gt;
    Port source :       ...&lt;/P&gt;

&lt;P&gt;Informations de partage :&lt;BR /&gt;
    Nom de partage :        ...&lt;BR /&gt;
    Chemin d’accès du partage :      ...&lt;BR /&gt;
    Nom cible relatif : ...&lt;/P&gt;

&lt;P&gt;Informations sur la demande d’accès :&lt;BR /&gt;
    Masque d’accès :     ...&lt;BR /&gt;
    &lt;STRONG&gt;Accès :      SYNCHRONIZE&lt;BR /&gt;
                Lecture données (ou liste de répertoire)&lt;BR /&gt;
                ReadAttributes&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Résultat de la vérification d’accès :&lt;BR /&gt;
    SYNCHRONIZE:    Accordé par    D:(A;;FA;;;WD)&lt;BR /&gt;
                Lecture données (ou liste de répertoire): Accordé par    D:(A;;FA;;;WD)&lt;BR /&gt;
                ReadAttributes: Accordé par    D:(A;;FA;;;WD)&lt;/P&gt;

&lt;P&gt;Here we have the "Accès" (access) field which have 3 values (it could be more, it depends of the user action on the file), a set of value corresponding to the real action of the user (write, save, read...).&lt;/P&gt;

&lt;P&gt;My problem is the intelligent field extractor just consider Access is the first value, other values are considered as proper fields, since Windows Logs don't always use the same pattern...&lt;/P&gt;

&lt;P&gt;I tried to manually extract fields, with the native Splunk functionnality or with the Field Extractor App. I don't know if my log is too long, but it is truncated after "ID de Sécurité" (Security ID).&lt;/P&gt;

&lt;P&gt;Do you know how to do?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2016 13:46:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217879#M188004</guid>
      <dc:creator>Aexyn</dc:creator>
      <dc:date>2016-06-23T13:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Windows Security logs field extractor</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217880#M188005</link>
      <description>&lt;P&gt;Like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | rex "(?ms)^\s*Accès:\s+(?&amp;lt;Acesses&amp;gt;.*?)[\r\n]{2}" | makemv delim="\n" Acesses
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 24 Jun 2016 00:17:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217880#M188005</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-06-24T00:17:33Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Windows Security logs field extractor</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217881#M188006</link>
      <description>&lt;P&gt;Thank's for your reply.&lt;/P&gt;

&lt;P&gt;How can I manage the fact there is not always the same number or field? In my example there are 3 lines, but I have to manage other logs with more or less values.&lt;BR /&gt;
Sometimes there are 5 fields, sometimes 1. &lt;BR /&gt;
The only indicator is the blank line (\n\n or maybe \r\n\r\n) after the Access field.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2016 07:00:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217881#M188006</guid>
      <dc:creator>Aexyn</dc:creator>
      <dc:date>2016-06-24T07:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Windows Security logs field extractor</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217882#M188007</link>
      <description>&lt;P&gt;My answer creates a &lt;CODE&gt;multi-valued&lt;/CODE&gt; field that can have many values, one for each item in the list.  The double-newline terminator indicates the end of the list.  Just try it.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2016 16:43:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217882#M188007</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-06-24T16:43:35Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Windows Security logs field extractor</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217883#M188008</link>
      <description>&lt;P&gt;It seems that doesn't work. I have tried modifying a little the expression, since the exact format is :&lt;/P&gt;

&lt;P&gt;...&lt;BR /&gt;
Informations sur la demande d’accès :&lt;BR /&gt;
(1tab)Masque d’accès :(1tab)0x100081&lt;BR /&gt;
(1tabs)Accès :(1space)(1tab)SYNCHRONIZE&lt;BR /&gt;
(4tabs)Lecture données (ou liste de répertoire)&lt;BR /&gt;
(4tabs)ReadAttributes&lt;/P&gt;

&lt;P&gt;...&lt;/P&gt;

&lt;P&gt;with tabulations, but without success.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2016 06:37:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217883#M188008</guid>
      <dc:creator>Aexyn</dc:creator>
      <dc:date>2016-06-27T06:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Windows Security logs field extractor</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217884#M188009</link>
      <description>&lt;P&gt;The only reason that I can see that it might now work is if there is whitespace between the newlines at the end so try this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; ... | rex "(?ms)^\s*Accès:\s+(?&amp;lt;Acesses&amp;gt;.*?)[\r\n]\s*[\r\n]" | makemv delim="\n" Acesses
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 27 Jun 2016 13:07:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217884#M188009</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-06-27T13:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Windows Security logs field extractor</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217885#M188010</link>
      <description>&lt;P&gt;It don't seem to work :(. The mystery is still running.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 06:40:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Problem-with-Windows-Security-logs-field-extractor/m-p/217885#M188010</guid>
      <dc:creator>Aexyn</dc:creator>
      <dc:date>2016-06-29T06:40:27Z</dc:date>
    </item>
  </channel>
</rss>

