<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Missing Event details when trying to Extract Fields from an Active Directory event in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Missing-Event-details-when-trying-to-Extract-Fields-from-an/m-p/31041#M6390</link>
    <description>&lt;P&gt;unfortunately, no.&lt;/P&gt;</description>
    <pubDate>Fri, 27 Aug 2010 02:48:32 GMT</pubDate>
    <dc:creator>carasso</dc:creator>
    <dc:date>2010-08-27T02:48:32Z</dc:date>
    <item>
      <title>Missing Event details when trying to Extract Fields from an Active Directory event</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-Event-details-when-trying-to-Extract-Fields-from-an/m-p/31038#M6387</link>
      <description>&lt;P&gt;I have the following raw AD event which I can see from my search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;08/16/2010 12:55:56.0110
dcName=w2k3r2.demo.dev
admonEventType=Update
Names:
    objectCategory=CN=Service-Connection-Point,CN=Schema,CN=Configuration,DC=demo,DC=dev
    name=bsmith
    displayName=$CimsUserVersion2
    distinguishedName=CN=bsmith,CN=Users,CN=default,CN=Zones,CN=Centrify,CN=Program Data,DC=demo,DC=dev
    cn=bsmith
Object Details:
    objectGUID=cffb0829-0642-134c-2ef1-f03cc696e10b
    whenChanged=20100816195556.0Z
    whenCreated=20070906020209.0Z
    objectClass=top|leaf|connectionPoint|serviceConnectionPoint
Event Details:
    uSNChanged=127046
    uSNCreated=14129
    instanceType=4
Additional Details:
    keywords=foo:1111|bar:3333|too:3333
    showInAdvancedViewOnly=TRUE
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Whenever I try to use the "Extact Fields" UI, the event is truncated after "Event Details" in the "Sample events" frame.   What's preventing me from seeing the entire event?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2010 03:17:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-Event-details-when-trying-to-Extract-Fields-from-an/m-p/31038#M6387</guid>
      <dc:creator>mpatnode</dc:creator>
      <dc:date>2010-08-17T03:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: Missing Event details when trying to Extract Fields from an Active Directory event</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-Event-details-when-trying-to-Extract-Fields-from-an/m-p/31039#M6388</link>
      <description>&lt;P&gt;In order to prevent the limited screen real estate from exploding, sample events are truncated at 15 lines (with at most 100 events).  I have filed a request for improvement.  &lt;/P&gt;

&lt;P&gt;From the standard search view, you can still manually test out a regex with the 'rex' search command, and when it works, manually add that regex to your source or sourcetype from the Manager (i.e., Manager » Fields » Field extractions)&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2010 05:55:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-Event-details-when-trying-to-Extract-Fields-from-an/m-p/31039#M6388</guid>
      <dc:creator>carasso</dc:creator>
      <dc:date>2010-08-17T05:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: Missing Event details when trying to Extract Fields from an Active Directory event</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-Event-details-when-trying-to-Extract-Fields-from-an/m-p/31040#M6389</link>
      <description>&lt;P&gt;Well that explains that.   I did figure out how to use 'rex' as a work around.    The next question is can I do dynamic field name generation the same way Splunk does?   Something like this:&lt;/P&gt;

&lt;P&gt;sourcetype="ActiveDirectory" keywords=* | rex field=_raw "keywords=(?&amp;lt;_KEY_1&amp;gt;[a-z]&lt;EM&gt;):(?&amp;lt;_VALUE_1&amp;gt;[0-9]&lt;/EM&gt;)&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 09:16:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-Event-details-when-trying-to-Extract-Fields-from-an/m-p/31040#M6389</guid>
      <dc:creator>mpatnode</dc:creator>
      <dc:date>2020-09-28T09:16:05Z</dc:date>
    </item>
    <item>
      <title>Re: Missing Event details when trying to Extract Fields from an Active Directory event</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-Event-details-when-trying-to-Extract-Fields-from-an/m-p/31041#M6390</link>
      <description>&lt;P&gt;unfortunately, no.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Aug 2010 02:48:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-Event-details-when-trying-to-Extract-Fields-from-an/m-p/31041#M6390</guid>
      <dc:creator>carasso</dc:creator>
      <dc:date>2010-08-27T02:48:32Z</dc:date>
    </item>
  </channel>
</rss>

