<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extract Log Data in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571699#M199215</link>
    <description>&lt;P&gt;We need to know more to offer specific help.&amp;nbsp; For example, what platform?&amp;nbsp; What does the data look like?&lt;/P&gt;</description>
    <pubDate>Wed, 20 Oct 2021 17:00:53 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2021-10-20T17:00:53Z</dc:date>
    <item>
      <title>Extract Log Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571574#M199173</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;I am pulling hair to figure out a query to extract data into a table with following information.&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;stopping system logging (rsyslog)&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;stopping the Tripwire agent&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;stopping the Splunk agent&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;In hosts. Also want to know who stopped/disabled those services at what time so I can reconcile it with approved changes.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Really appreciate if someone can help.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 01:10:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571574#M199173</guid>
      <dc:creator>GRC</dc:creator>
      <dc:date>2021-10-20T01:10:02Z</dc:date>
    </item>
    <item>
      <title>Re: Extract Log Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571699#M199215</link>
      <description>&lt;P&gt;We need to know more to offer specific help.&amp;nbsp; For example, what platform?&amp;nbsp; What does the data look like?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 17:00:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571699#M199215</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-10-20T17:00:53Z</dc:date>
    </item>
    <item>
      <title>Re: Extract Log Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571729#M199225</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The data is in Splunk.&lt;/P&gt;&lt;P&gt;The logs are in the xxx_log..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 22:15:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571729#M199225</guid>
      <dc:creator>GRC</dc:creator>
      <dc:date>2021-10-20T22:15:24Z</dc:date>
    </item>
    <item>
      <title>Re: Extract Log Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571735#M199229</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/239922"&gt;@GRC&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sample log events data will help to work further on your request.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 23:07:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571735#M199229</guid>
      <dc:creator>nmohammed</dc:creator>
      <dc:date>2021-10-20T23:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: Extract Log Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571742#M199235</link>
      <description>&lt;P&gt;Yes, I guessed the data is in Splunk, but is it Windows data, Linux data, or some other source?&lt;/P&gt;&lt;P&gt;As already suggested, it's very helpful to see sample events.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 23:55:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571742#M199235</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-10-20T23:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: Extract Log Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571945#M199302</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/192553"&gt;@nmohammed&lt;/a&gt;&amp;nbsp;Thank you.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are some sample logs:&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is one source:&lt;/P&gt;&lt;P&gt;Oct 21 15:13:51 swc-03-jals rsyslogd: [origin software="rsyslogd" swVersion="1.24.5-57.el5_9.1" x-pid="1313" x-info="&lt;A href="http://www.rsyslog.com" target="_blank" rel="noopener"&gt;http://www.rsyslog.com&lt;/A&gt;"] start&lt;BR /&gt;host = edc-03-jals&lt;BR /&gt;index = linux_logs&lt;BR /&gt;source = /var/log/messages&lt;BR /&gt;sourcetype = syslog&lt;/P&gt;&lt;P&gt;The other one is:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Oct 21 12:40:15 keybox sudosh: i3ev9zjyY46UEJPj jasan: service rsyslog start&lt;BR /&gt;host = keybox&lt;BR /&gt;index = sudosh_app_pro&lt;BR /&gt;source = /var/log/hosts/messages&lt;BR /&gt;sourcetype = sudosh_app&lt;/P&gt;&lt;P&gt;Oct 21 12:40:09 keybox sudosh: i3ev9zjyY46UEJPj jasan: service rsyslog stop&lt;BR /&gt;host = keybox&lt;BR /&gt;index = sudosh_app_pro&lt;BR /&gt;source = /var/log/hosts/messages&lt;BR /&gt;sourcetype = sudosh_app&lt;/P&gt;&lt;P&gt;I want to combine these 2 sources into a single table and found who started or stopped rsyslog service at what time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 22 Oct 2021 06:02:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571945#M199302</guid>
      <dc:creator>GRC</dc:creator>
      <dc:date>2021-10-22T06:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: Extract Log Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571973#M199311</link>
      <description>&lt;P&gt;It's not (mostly) about querying the data you already have. It's more about what information you have in your logs.&lt;/P&gt;&lt;P&gt;Typically, unless you have some other means of monitoring the system, you only get the info that a service has been started/stopped/restarted and so on coming from either the service itself or in some cases the init process (usually the systemd these days). But if you don't have any other method of monitoring your users activity, you won't know who was responsible for stopping the service because you don't have this information in your logs.&lt;/P&gt;&lt;P&gt;OK, you could do some correlations between logged-in sessions and the time of service start/stop but it's easily defeatable by running a process with a delayed action (like running a "sleep 3600 &amp;amp;&amp;amp; systemctl restart rsyslogd" in a screen). You would also not be able to tell which user did something in case of more than one user logged in at the same time.&lt;/P&gt;&lt;P&gt;So the general problem is not how to search for this data in splunk but rather how to get this data from your source and - most importantly - whether the source does log this at all.&lt;/P&gt;&lt;P&gt;There are many ways of approaching user activity logging and that's definitely out of scope of the splunk forum - the only connection is that there are some ready-made apps for some solutions (like auditd) but that's it. You still have to do most of the work on the source side.&lt;/P&gt;&lt;P&gt;OK. I see that some of your logs show sudo activity. That can be traced indeed. But that's where it gets a bit more complicated. It all comes down what you want to find.&lt;/P&gt;&lt;P&gt;If you just want to find all sudo logs where someone launched a "sevice &amp;lt;whatever&amp;gt; &amp;lt;command&amp;gt;" command, that's relatively easy but it doesn't tell you anything about the service behaviour itself. So it all boils down on what _precisely_ would be your requirement.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Oct 2021 09:08:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-Log-Data/m-p/571973#M199311</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2021-10-22T09:08:32Z</dc:date>
    </item>
  </channel>
</rss>

