<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extracting Source Network Address from Windows Logs in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extracting-Source-Network-Address-from-Windows-Logs/m-p/567470#M197758</link>
    <description>&lt;P&gt;I was able to write regex to extract it.&lt;/P&gt;&lt;P&gt;Source Network Address:(?&amp;lt;ip&amp;gt;.\S+)&lt;/P&gt;&lt;P&gt;The Issues I had and remediations&lt;/P&gt;&lt;P&gt;1. The splunk Field Extractor window would cut off Microsoft windows event payloads by a half. So I could not select the field.&lt;/P&gt;&lt;P&gt;2. Splunk auto associates strings and ip's etc to a common field that can be utilized to be remapped across the environment so it can learn what these are. For example an IP Address is associated with &amp;lt;IP&amp;gt;&lt;/P&gt;&lt;P&gt;3. The Regex is not like normal regex that I'm used to for example (.?*)&lt;/P&gt;&lt;P&gt;4. The Source Network Address would pull back private IP's and public IP's Across the same event code. I extracted the private ones, then tried to find the IP field in the verbose mode search. Unfortunately, it wouldn't populate.&amp;nbsp; So I re-ran the search and extracted the public IP field under the same field (Source Network Address) and then extracted it and named it Source Network Address -pub. This then populated my public ip's.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Sep 2021 16:58:59 GMT</pubDate>
    <dc:creator>hiteshkh</dc:creator>
    <dc:date>2021-09-17T16:58:59Z</dc:date>
    <item>
      <title>Extracting Source Network Address from Windows Logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-Source-Network-Address-from-Windows-Logs/m-p/567457#M197757</link>
      <description>&lt;P&gt;Im working on extracting Source Network Address's from Splunk I've spent the past few hours defining my query and after a few days of researching and troubleshooting got it narrowed to the following.&lt;/P&gt;&lt;P&gt;The problem is the Source_Network_Address in windows event logs appears without spaces and the query is pulling data back that is not accurate for me. Im looking for Public IP's RDPing to a host not private IPs.&lt;/P&gt;&lt;P&gt;index=windows EventCode=4625&amp;nbsp; Source_Network_Address!="127.0.0.1" Source_Network_Address!="::1" | eventstats count as "EventCount" by EventCode | table EventCode EventCodeDescription EventCount Source_Network_Address ComputerName | sort EventCode | where EventCount&amp;gt;80&lt;/P&gt;&lt;P&gt;Yes I've tried excluding internal subnets however this is still not giving me expected output.&lt;/P&gt;&lt;P&gt;I need a way to extract Source Network Address without spaces.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.splunk.com/t5/Splunk-Search/Need-to-pull-IP-from-Message-field/m-p/559816" target="_blank" rel="noopener"&gt;https://community.splunk.com/t5/Splunk-Search/Need-to-pull-IP-from-Message-field/m-p/559816&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I tried this however we are not extracting it via the IP Field.&lt;/P&gt;&lt;P&gt;When I go to extract the regex after searching by event count and index the field gets cut off in the regex editor that loads up. Not sure how to proceed here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 16:05:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-Source-Network-Address-from-Windows-Logs/m-p/567457#M197757</guid>
      <dc:creator>hiteshkh</dc:creator>
      <dc:date>2021-09-17T16:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting Source Network Address from Windows Logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-Source-Network-Address-from-Windows-Logs/m-p/567470#M197758</link>
      <description>&lt;P&gt;I was able to write regex to extract it.&lt;/P&gt;&lt;P&gt;Source Network Address:(?&amp;lt;ip&amp;gt;.\S+)&lt;/P&gt;&lt;P&gt;The Issues I had and remediations&lt;/P&gt;&lt;P&gt;1. The splunk Field Extractor window would cut off Microsoft windows event payloads by a half. So I could not select the field.&lt;/P&gt;&lt;P&gt;2. Splunk auto associates strings and ip's etc to a common field that can be utilized to be remapped across the environment so it can learn what these are. For example an IP Address is associated with &amp;lt;IP&amp;gt;&lt;/P&gt;&lt;P&gt;3. The Regex is not like normal regex that I'm used to for example (.?*)&lt;/P&gt;&lt;P&gt;4. The Source Network Address would pull back private IP's and public IP's Across the same event code. I extracted the private ones, then tried to find the IP field in the verbose mode search. Unfortunately, it wouldn't populate.&amp;nbsp; So I re-ran the search and extracted the public IP field under the same field (Source Network Address) and then extracted it and named it Source Network Address -pub. This then populated my public ip's.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 16:58:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-Source-Network-Address-from-Windows-Logs/m-p/567470#M197758</guid>
      <dc:creator>hiteshkh</dc:creator>
      <dc:date>2021-09-17T16:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting Source Network Address from Windows Logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-Source-Network-Address-from-Windows-Logs/m-p/567473#M197761</link>
      <description>&lt;P&gt;Finalized working query&lt;/P&gt;&lt;P&gt;index=windows EventCode=4625 ip!="&lt;STRONG&gt;private ip range to exclude&lt;/STRONG&gt;" ip!="127.0.0.1" ip!="::1" ip!="-" ComputerName!="&lt;STRONG&gt;hostname you'd like to exclude that's&amp;nbsp;noisy or you're aware of&lt;/STRONG&gt;" | eventstats count as "EventCount" by EventCode | table EventCode EventCount ip ComputerName | sort EventCode | where EventCount&amp;gt;80&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 17:32:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-Source-Network-Address-from-Windows-Logs/m-p/567473#M197761</guid>
      <dc:creator>hiteshkh</dc:creator>
      <dc:date>2021-09-17T17:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting Source Network Address from Windows Logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-Source-Network-Address-from-Windows-Logs/m-p/567728#M197862</link>
      <description>&lt;P&gt;The previous Query was counting all events displayed. I modified this further and now I can get a failure count by ip.&lt;/P&gt;&lt;P&gt;index=windows EventCode=4625 ip!="&lt;STRONG&gt;private ip range to exclude&lt;/STRONG&gt;" ip!="127.0.0.1" ip!="::1" ip!="-" | stats count as failures by ip, EventCode, ComputerName,| table EventCode ip failures ComputerName | sort failures | reverse&lt;/P&gt;&lt;P&gt;In addition you can easily add hostnames you wish to exclude with the line below by adding this before the | stats&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ComputerName!="&lt;/SPAN&gt;&lt;STRONG&gt;hostname you'd like to exclude that's&amp;nbsp;noisy or you're aware of&lt;/STRONG&gt;&lt;SPAN&gt;"&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Sep 2021 17:47:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-Source-Network-Address-from-Windows-Logs/m-p/567728#M197862</guid>
      <dc:creator>hiteshkh</dc:creator>
      <dc:date>2021-09-20T17:47:42Z</dc:date>
    </item>
  </channel>
</rss>

