<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How we can parse these Event ? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673036#M230491</link>
    <description>&lt;P&gt;Getting a bit more complex but I think something like this will get you started.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex field=_raw "\]\s+(?&amp;lt;log_level&amp;gt;[A-Z]+)\s+(?&amp;lt;log_type&amp;gt;[^\s]+)\s+\-"
    | rex field=_raw "\-\s+\([^\)]+\)\s+(?&amp;lt;message_detail&amp;gt;(?:.*(?:[\r\n]+)*)*)"
    | rex field=_raw "user\s+\'(?&amp;lt;user&amp;gt;[^\']+)\'"
    | rex field=_raw "client\s+(?&amp;lt;client&amp;gt;\d{1,3}(?:\.\d{1,3}){3})\:(?&amp;lt;port&amp;gt;\d+)"
    | rex field=_raw "\[TID\:(?&amp;lt;tid&amp;gt;[^\]]+)\]"
    | rex field=_raw "\]\s+[A-Z]+\s+[a-zA-Z0-9]+(?:\.[a-zA-Z0-9]+)*\s+\-\s+(?&amp;lt;message&amp;gt;.*)"
    | rex field=_raw "(?i)cannot\s+open\s+(?&amp;lt;service&amp;gt;[^\s]+)\s+service\s+on\s+computer\s+\'(?&amp;lt;computer&amp;gt;[^\']+)\'"
    ``` log_type="Thycotic.Discovery.Sources.Scanners.Dependency.ApplicationPoolScanner"  ```
    | rex field=_raw "(?i)\s+\-\s+(?&amp;lt;app&amp;gt;.*?)\s+unable\s+to\s+connect\s+to\s+(?&amp;lt;hostname&amp;gt;[^\s]+)\s+with\s+exception\s+(?&amp;lt;exception_type&amp;gt;[^\:]+)\:\s+(?&amp;lt;exception_message&amp;gt;.*)"
    ``` log_type="Thycotic.Discovery.Sources.Scanners.Dependency.ApplicationPoolScanner" error_message ```
    | rex field=_raw "(?i)\s+\-\s+retrieving\s+the\s+(?&amp;lt;class&amp;gt;[^\s]+)\s+class\s+factory\s+for\s+remote\s+component\s+with\s+clsid\s+\{(?&amp;lt;clsid&amp;gt;[^\}]+)\}\s+from\s+machine\s+(?&amp;lt;hostname&amp;gt;[^\s]+)\s+failed\s+due\s+to\s+the\s+following\s+error\:\s+(?&amp;lt;error_code&amp;gt;[^\s]+)"
    | rex field=_raw "(?i)(?&amp;lt;exception_type&amp;gt;\w+(\.\w+)*exception)\:\s+(?&amp;lt;exception_message&amp;gt;.*)"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;BR /&gt;Since the evals to standardize messages probably isn't all that scalable with these logs, it may make sense to set up eventtyping around them to assist with any sort of analysis. Once you have eventtypes set up that can assist with targeting specific type of events and finding patterns that you can develop regex for and pull out all the necessary fields.&lt;BR /&gt;&lt;BR /&gt;screenshot below for reference of what the above regex should do.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dtburrows3_0-1704215571101.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/28714i7CD87D68B92778B5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dtburrows3_0-1704215571101.png" alt="dtburrows3_0-1704215571101.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 02 Jan 2024 17:13:16 GMT</pubDate>
    <dc:creator>dtburrows3</dc:creator>
    <dc:date>2024-01-02T17:13:16Z</dc:date>
    <item>
      <title>How we can parse these Event ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673028#M230488</link>
      <description>&lt;P&gt;Hi friends,&lt;/P&gt;&lt;P&gt;Could anyone pls help me in parsing these event and use case( when ever we launch rdp/proxy from secret server we are seeing some drop in the connection like one for the client and another for the user) out of this event. how we can we extract the relevant fields to make a search out of these events ?&lt;/P&gt;&lt;P&gt;1. Sample event :&lt;/P&gt;&lt;P&gt;2024-01-02 10:04:01,420 [CID:] [C:] [TID:151] ERROR Thycotic.RDPProxy.CLI.Session.ProxyConnection - Error encountered in RDP handshake for client xx.xx.xx.xx:53475 - (null)&lt;BR /&gt;System.Exception: Assertion violated: stream.ReadByteInto(bufferStream) == 0x03&lt;BR /&gt;at Thycotic.RDPProxy.ContractSlim.Assert(Boolean condition, String conditionStr, String actualStr)&lt;BR /&gt;at Thycotic.RDPProxy.Readers.ConnectionRequestProvider.ReadConnectionRequest(Stream stream, AuthenticationState clientState)&lt;BR /&gt;at Thycotic.RDPProxy.CLI.Session.ProxyConnection.&amp;lt;DoHandshakeAndForward&amp;gt;d__20.MoveNext()&lt;/P&gt;&lt;P&gt;2. Sample event :&lt;/P&gt;&lt;P&gt;2024-01-02 09:27:42,911 [CID:] [C:] [TID:137] ERROR Thycotic.DE.Feature.SS.RdpProxy.EngineRdpProxySessionService - An error was encountered while attempt to fetch proxy credentials for user 'Jhoncena' - (null)&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jan 2024 15:46:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673028#M230488</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2024-01-02T15:46:22Z</dc:date>
    </item>
    <item>
      <title>Re: How we can parse these Event ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673030#M230489</link>
      <description>&lt;P&gt;Something like this maybe?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;base_search&amp;gt;
    | rex field=_raw "\]\s+(?&amp;lt;log_level&amp;gt;[A-Z]+)\s+(?&amp;lt;log_type&amp;gt;[^\s]+)\s+\-\s+(?&amp;lt;message&amp;gt;.*?)\s+\-"
    | rex field=_raw "\-\s+\([^\)]+\)\s+(?&amp;lt;message_detail&amp;gt;(?:.*(?:[\r\n]+)*)*)"
    | rex field=_raw "user\s+\'(?&amp;lt;user&amp;gt;[^\']+)\'"
    | rex field=_raw "client\s+(?&amp;lt;client&amp;gt;\d{1,3}(?:\.\d{1,3}){3})\:(?&amp;lt;port&amp;gt;\d+)"
    | rex field=_raw "\[TID\:(?&amp;lt;tid&amp;gt;[^\]]+)\]"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Not familiar with the data but based on the 2 sample logs you provided was able to identify a few fields that I think would be useful. You can see from the screenshot below that these fields appear to be successfully extracted.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dtburrows3_0-1704211292826.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/28712iF462F2F39389898D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dtburrows3_0-1704211292826.png" alt="dtburrows3_0-1704211292826.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;And to standardize the messages (at least for these examples) you can add an eval like this after the field extractions.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| eval
        standardized_message=replace(replace(message, "client\s+(\d{1,3}(?:\.\d{1,3}){3})\:(\d+)", "client"), "user\s+\'([^\']+)\'", "user")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;You can see in the screenshot that the field 'standardized_message' removes any variable data so you can do some sort of aggregate analysis against the standardized message itself if needed.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dtburrows3_0-1704211849097.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/28713i1803105F239E36F0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dtburrows3_0-1704211849097.png" alt="dtburrows3_0-1704211849097.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jan 2024 16:10:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673030#M230489</guid>
      <dc:creator>dtburrows3</dc:creator>
      <dc:date>2024-01-02T16:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: How we can parse these Event ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673032#M230490</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/263242"&gt;@dtburrows3&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I have another use case is discovery process from AD to Secret server like scan AD and finds the local id creates the id/password into secret.&lt;BR /&gt;&lt;BR /&gt;1. Sample event:&lt;BR /&gt;&lt;BR /&gt;2024-01-02 11:18:28,597 [CID:] [C:] [TID:131] ERROR Thycotic.Discovery.Sources.Scanners.Dependency.ApplicationPoolScanner - WMI (IIS) Unable to connect to WINDOWS1.mf.win.cisco.com with Exception System.Management.ManagementException: Invalid namespace&lt;BR /&gt;at System.Management.ThreadDispatch.Start()&lt;BR /&gt;at System.Management.ManagementScope.Initialize()&lt;BR /&gt;at Thycotic.Discovery.Sources.Scanners.Dependency.ApplicationPoolScanner.&amp;lt;&amp;gt;c__DisplayClass10_0.&amp;lt;IsIisRunningWmi&amp;gt;b__0(Object x) - (null)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;2. Sample event:&lt;/P&gt;&lt;P&gt;2024-01-02 11:18:14,330 [CID:] [C:] [TID:PriorityScheduler Elastic Thread @ Normal] ERROR Thycotic.Discovery.Sources.Scanners.Dependency.ApplicationPoolScanner - Service Controller (IIS) Unable to connect to LINUX.mf.win.cisco.com with Exception System.InvalidOperationException: Cannot open W3SVC service on computer 'LINUX.mf.win.cisco.com'. ---&amp;gt; System.ComponentModel.Win32Exception: Access is denied&lt;BR /&gt;--- End of inner exception stack trace ---&lt;BR /&gt;at System.ServiceProcess.ServiceController.GetServiceHandle(Int32 desiredAccess)&lt;BR /&gt;at System.ServiceProcess.ServiceController.GenerateStatus()&lt;BR /&gt;at System.ServiceProcess.ServiceController.get_Status()&lt;BR /&gt;at Thycotic.Discovery.Sources.Scanners.Dependency.ApplicationPoolScanner.IsIisRunningServiceController() - (null)&lt;/P&gt;&lt;P&gt;3. Sample Event :&lt;/P&gt;&lt;P&gt;2024-01-02 11:18:06,544 [CID:] [C:] [TID:PriorityScheduler Elastic Thread @ Normal] ERROR Thycotic.Discovery.Sources.Scanners.Dependency.ApplicationPoolScanner - Retrieving the COM class factory for remote component with CLSID {45RFGHDH-FFSG-6474-HDHDH-1454TGGD} from machine UBUNTU.mf.win.cisco.com failed due to the following error: 80070005 UBUNTU.mf.win.cisco.com. - (null)&lt;BR /&gt;System.UnauthorizedAccessException: Retrieving the COM class factory for remote component with CLSID {2YHFDO-3443-4FGDH-5353-RFRRE6} from machine UBUNTU.mf.win.cisco.com failed due to the following error: 80070005 UBUNTU.mf.win.cisco.com.&lt;BR /&gt;at Thycotic.Discovery.Sources.Scanners.Dependency.ApplicationPoolScanner.ScanIIS7AndAbove()&lt;BR /&gt;&lt;BR /&gt;4. Sample event :&lt;/P&gt;&lt;P&gt;2024-01-02 11:18:03,664 [CID:] [C:] [TID:PriorityScheduler Elastic Thread @ Normal] ERROR Thycotic.Discovery.Sources.Scanners.Dependency.ApplicationPoolScanner - Service Controller (IIS) Unable to connect to IHUIHD13.mf.win.cisco.com with Exception System.InvalidOperationException: Cannot open W3SVC service on computer 'YHGVDJ.mf.win.cisco.com'. ---&amp;gt; System.ComponentModel.Win32Exception: Access is denied&lt;BR /&gt;--- End of inner exception stack trace ---&lt;BR /&gt;at System.ServiceProcess.ServiceController.GetServiceHandle(Int32 desiredAccess)&lt;BR /&gt;at System.ServiceProcess.ServiceController.GenerateStatus()&lt;BR /&gt;at System.ServiceProcess.ServiceController.get_Status()&lt;BR /&gt;at Thycotic.Discovery.Sources.Scanners.Dependency.ApplicationPoolScanner.IsIisRunningServiceController() - (null)&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jan 2024 16:29:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673032#M230490</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2024-01-02T16:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: How we can parse these Event ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673036#M230491</link>
      <description>&lt;P&gt;Getting a bit more complex but I think something like this will get you started.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex field=_raw "\]\s+(?&amp;lt;log_level&amp;gt;[A-Z]+)\s+(?&amp;lt;log_type&amp;gt;[^\s]+)\s+\-"
    | rex field=_raw "\-\s+\([^\)]+\)\s+(?&amp;lt;message_detail&amp;gt;(?:.*(?:[\r\n]+)*)*)"
    | rex field=_raw "user\s+\'(?&amp;lt;user&amp;gt;[^\']+)\'"
    | rex field=_raw "client\s+(?&amp;lt;client&amp;gt;\d{1,3}(?:\.\d{1,3}){3})\:(?&amp;lt;port&amp;gt;\d+)"
    | rex field=_raw "\[TID\:(?&amp;lt;tid&amp;gt;[^\]]+)\]"
    | rex field=_raw "\]\s+[A-Z]+\s+[a-zA-Z0-9]+(?:\.[a-zA-Z0-9]+)*\s+\-\s+(?&amp;lt;message&amp;gt;.*)"
    | rex field=_raw "(?i)cannot\s+open\s+(?&amp;lt;service&amp;gt;[^\s]+)\s+service\s+on\s+computer\s+\'(?&amp;lt;computer&amp;gt;[^\']+)\'"
    ``` log_type="Thycotic.Discovery.Sources.Scanners.Dependency.ApplicationPoolScanner"  ```
    | rex field=_raw "(?i)\s+\-\s+(?&amp;lt;app&amp;gt;.*?)\s+unable\s+to\s+connect\s+to\s+(?&amp;lt;hostname&amp;gt;[^\s]+)\s+with\s+exception\s+(?&amp;lt;exception_type&amp;gt;[^\:]+)\:\s+(?&amp;lt;exception_message&amp;gt;.*)"
    ``` log_type="Thycotic.Discovery.Sources.Scanners.Dependency.ApplicationPoolScanner" error_message ```
    | rex field=_raw "(?i)\s+\-\s+retrieving\s+the\s+(?&amp;lt;class&amp;gt;[^\s]+)\s+class\s+factory\s+for\s+remote\s+component\s+with\s+clsid\s+\{(?&amp;lt;clsid&amp;gt;[^\}]+)\}\s+from\s+machine\s+(?&amp;lt;hostname&amp;gt;[^\s]+)\s+failed\s+due\s+to\s+the\s+following\s+error\:\s+(?&amp;lt;error_code&amp;gt;[^\s]+)"
    | rex field=_raw "(?i)(?&amp;lt;exception_type&amp;gt;\w+(\.\w+)*exception)\:\s+(?&amp;lt;exception_message&amp;gt;.*)"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;BR /&gt;Since the evals to standardize messages probably isn't all that scalable with these logs, it may make sense to set up eventtyping around them to assist with any sort of analysis. Once you have eventtypes set up that can assist with targeting specific type of events and finding patterns that you can develop regex for and pull out all the necessary fields.&lt;BR /&gt;&lt;BR /&gt;screenshot below for reference of what the above regex should do.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dtburrows3_0-1704215571101.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/28714i7CD87D68B92778B5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dtburrows3_0-1704215571101.png" alt="dtburrows3_0-1704215571101.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jan 2024 17:13:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673036#M230491</guid>
      <dc:creator>dtburrows3</dc:creator>
      <dc:date>2024-01-02T17:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: How we can parse these Event ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673117#M230506</link>
      <description>&lt;P&gt;&lt;BR /&gt;I'm trying to build a custom app to parse the all these events and above field extraction into props and tranforms can you help me in adding all these extractions in to props.conf ?&lt;BR /&gt;Sample Events:&lt;BR /&gt;2024-01-03 05:06:09,590&amp;nbsp; [TID:450] ERROR Thycotic.DistributedEngineRunner - Error getting Capabilities from Distributed Engine server - (null)&lt;BR /&gt;System.NullReferenceException: Object reference not set to an instance of an object.&lt;BR /&gt;&lt;BR /&gt;TQ&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 10:27:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673117#M230506</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2024-01-09T10:27:18Z</dc:date>
    </item>
    <item>
      <title>Re: How we can parse these Event ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673168#M230519</link>
      <description>&lt;P&gt;A props.conf for these extractions would look like this.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[&amp;lt;sourcetype_name&amp;gt;]
EXTRACT-log_level_and_type = \[TID\:(?&amp;lt;tid&amp;gt;[^\]]+)\]\s+(?&amp;lt;log_level&amp;gt;[A-Z]+)\s+(?&amp;lt;log_type&amp;gt;[^\s]+)
EXTRACT-cid = \[CID\:(?&amp;lt;cid&amp;gt;[^\]]+)\]
EXTRACT-message = [A-Z]+\s+\w+(?:\.\w+)*\s+\-\s+(?&amp;lt;message&amp;gt;.*)\s+\-\s+\(
EXTRACT-user = user\s+\'(?&amp;lt;user&amp;gt;[^\']+)\'
EXTRACT-client_ip = client\s+(?&amp;lt;client&amp;gt;\d{1,3}(?:\.\d{1,3}){3})\:(?&amp;lt;port&amp;gt;\d+)
EXTRACT-cannot_open_service_error = (?i)cannot\s+open\s+(?&amp;lt;service&amp;gt;[^\s]+)\s+service\s+on\s+computer\s+\'(?&amp;lt;computer&amp;gt;[^\']+)\'
EXTRACT-unable_to_connect_to_host_exception = (?i)\s+\-\s+(?&amp;lt;app&amp;gt;.*?)\s+unable\s+to\s+connect\s+to\s+(?&amp;lt;hostname&amp;gt;[^\s]+)\s+with\s+exception\s+(?&amp;lt;exception_type&amp;gt;[^\:]+)\:\s+(?&amp;lt;exception_message&amp;gt;.*)
EXTRACT-retrieving_class_failed_due_to_error = (?i)\s+\-\s+retrieving\s+the\s+(?&amp;lt;class&amp;gt;[^\s]+)\s+class\s+factory\s+for\s+remote\s+component\s+with\s+clsid\s+\{(?&amp;lt;clsid&amp;gt;[^\}]+)\}\s+from\s+machine\s+(?&amp;lt;hostname&amp;gt;[^\s]+)\s+failed\s+due\s+to\s+the\s+following\s+error\:\s+(?&amp;lt;error_code&amp;gt;[^\s]+)
EXTRACT-exception_messages = (?i)(?&amp;lt;exception_type&amp;gt;\w+(\.\w+)*exception)\:\s+(?&amp;lt;exception_message&amp;gt;.*)
EXTRACT-error_codes = (?i)due\s+to\s+error\s+(?&amp;lt;error_code&amp;gt;[^\s]+)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;And the accompanying default.meta something like this (depending on your desired permissions)&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[props]
access = read : [ * ], write : [ admin, power ]
export = system&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 03 Jan 2024 19:15:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-we-can-parse-these-Event/m-p/673168#M230519</guid>
      <dc:creator>dtburrows3</dc:creator>
      <dc:date>2024-01-03T19:15:28Z</dc:date>
    </item>
  </channel>
</rss>

