<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic rename EventCodes in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248323#M74102</link>
    <description>&lt;P&gt;Is there a way to rename EventCodes xxxx field to "description" in timechart?  Here is a sample search:&lt;/P&gt;

&lt;P&gt;Account_Name=* (EventCode=4800 OR EventCode=4801 OR EventCode=4768) index=blah sourcetype="WinEventLog:Security" source="WinEventLog:Security" | timechart count by EventCode&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Tue, 15 Mar 2016 08:31:45 GMT</pubDate>
    <dc:creator>smudge797</dc:creator>
    <dc:date>2016-03-15T08:31:45Z</dc:date>
    <item>
      <title>rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248323#M74102</link>
      <description>&lt;P&gt;Is there a way to rename EventCodes xxxx field to "description" in timechart?  Here is a sample search:&lt;/P&gt;

&lt;P&gt;Account_Name=* (EventCode=4800 OR EventCode=4801 OR EventCode=4768) index=blah sourcetype="WinEventLog:Security" source="WinEventLog:Security" | timechart count by EventCode&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 08:31:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248323#M74102</guid>
      <dc:creator>smudge797</dc:creator>
      <dc:date>2016-03-15T08:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248324#M74103</link>
      <description>&lt;P&gt;Hi &lt;BR /&gt;
I rectified use case statement and retry&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; Account_Name=* (EventCode=4800 OR EventCode=4801 OR EventCode=4768) index=blah sourcetype="WinEventLog:Security" source="WinEventLog:Security"|eval description=case(EventCode=="4768","A Kerberos authentication ticket (TGT) was requested and User Logged in", EventCode=="4800" , "The workstation was locked" , EventCode=="4801" , "The workstation was unlocked") | timechart count by description
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 15 Mar 2016 08:36:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248324#M74103</guid>
      <dc:creator>chimell</dc:creator>
      <dc:date>2016-03-15T08:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248325#M74104</link>
      <description>&lt;P&gt;Thanks but i need the description to be something like:&lt;BR /&gt;
4768 A Kerberos authentication ticket (TGT) was requested &lt;BR /&gt;
4800 The workstation was locked&lt;BR /&gt;
4801 The workstation was unlocked &lt;BR /&gt;
4768 User Logged in&lt;/P&gt;

&lt;P&gt;Rather than just listing the event codes.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 08:46:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248325#M74104</guid>
      <dc:creator>smudge797</dc:creator>
      <dc:date>2016-03-15T08:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248326#M74105</link>
      <description>&lt;P&gt;you can use &lt;CODE&gt;replace&lt;/CODE&gt; command to do it .&lt;/P&gt;

&lt;P&gt;try like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | replace 4800 with "The workstation was locked" in EventCode| replace 4801 with "The workstation was unlocked" in EventCode|.....
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 15 Mar 2016 09:48:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248326#M74105</guid>
      <dc:creator>fdi01</dc:creator>
      <dc:date>2016-03-15T09:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248327#M74106</link>
      <description>&lt;P&gt;just retry my new search code above&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 10:11:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248327#M74106</guid>
      <dc:creator>chimell</dc:creator>
      <dc:date>2016-03-15T10:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248328#M74107</link>
      <description>&lt;P&gt;Nice!  Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 12:11:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248328#M74107</guid>
      <dc:creator>smudge797</dc:creator>
      <dc:date>2016-03-15T12:11:55Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248329#M74108</link>
      <description>&lt;P&gt;where are the query that you propose ?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 12:15:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248329#M74108</guid>
      <dc:creator>chimell</dc:creator>
      <dc:date>2016-03-15T12:15:23Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248330#M74109</link>
      <description>&lt;P&gt;i ok  with Mm chimell  where is your answer  Mm smudge797&lt;BR /&gt;
post your answer  because it can help somebody&lt;BR /&gt;
thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 08:39:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248330#M74109</guid>
      <dc:creator>fdi01</dc:creator>
      <dc:date>2016-03-16T08:39:39Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248331#M74110</link>
      <description>&lt;P&gt;This worked from Chimell.  Thanks&lt;/P&gt;

&lt;P&gt;Account_Name=* (EventCode=4800 OR EventCode=4801 OR EventCode=4768) index=blah sourcetype="WinEventLog:Security" source="WinEventLog:Security"|eval description=case(EventCode=="4768","A Kerberos authentication ticket (TGT) was requested and User Logged in", EventCode=="4800" , "The workstation was locked" , EventCode=="4801" , "The workstation was unlocked") | timechart count by description&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 08:50:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248331#M74110</guid>
      <dc:creator>smudge797</dc:creator>
      <dc:date>2016-03-16T08:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248332#M74111</link>
      <description>&lt;P&gt;go accept  and upvote answer of Mm chimell if you agree Mm smudge797&lt;BR /&gt;
thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 09:01:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248332#M74111</guid>
      <dc:creator>fdi01</dc:creator>
      <dc:date>2016-03-16T09:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248333#M74112</link>
      <description>&lt;P&gt;Hi smudge,&lt;/P&gt;

&lt;P&gt;Did you try CSV lookups ? Check this out&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.1/Knowledge/Addfieldsfromexternaldatasources#CSV_lookup_example"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.1/Knowledge/Addfieldsfromexternaldatasources#CSV_lookup_example&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Hope it helps!&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 13:29:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248333#M74112</guid>
      <dc:creator>alemarzu</dc:creator>
      <dc:date>2016-03-16T13:29:25Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248334#M74113</link>
      <description>&lt;P&gt;You should use a csv-Lookup here...&lt;/P&gt;

&lt;P&gt;Just follow these steps:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Create a csv-file containing the EventCodes and the Description
 you could use this site as a reference for the csv: &lt;A href="https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx"&gt;https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Upload the csv-file to Splunk via Settings -&amp;gt; Lookups -&amp;gt; Lookup Table files -&amp;gt; New&lt;/LI&gt;
&lt;LI&gt;optional: Create a lookup-Definition and a automatic lookup for your sourcetype (reference here: &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Addfieldsfromexternaldatasources"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Addfieldsfromexternaldatasources&lt;/A&gt;)&lt;/LI&gt;
&lt;LI&gt;Use the lookup to add the additional knowledge data&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Assuming your csv has the name &lt;CODE&gt;winevents.csv&lt;/CODE&gt; and has this structure:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; EventCode,Description
 513,Windows is shutting down
 514,An authentication package has been loaded by the Local Security Authority
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;this would be your search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; Account_Name=* (EventCode=4800 OR EventCode=4801 OR EventCode=4768) index=blah sourcetype="WinEventLog:Security" source="WinEventLog:Security" | lookup winevents.csv EventCode OUTPUT Description | timechart count by Description
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 16 Mar 2016 13:49:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248334#M74113</guid>
      <dc:creator>DMohn</dc:creator>
      <dc:date>2016-03-16T13:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248335#M74114</link>
      <description>&lt;P&gt;hi smudge797 &lt;BR /&gt;
you say that my answer is good . Now vote it .&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2016 09:30:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248335#M74114</guid>
      <dc:creator>chimell</dc:creator>
      <dc:date>2016-03-22T09:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: rename EventCodes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248336#M74115</link>
      <description>&lt;P&gt;hi I am following  the guideline but i am facing the error: Could not find all of the specified lookup fields in the lookup table" Please advise&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 12:44:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/rename-EventCodes/m-p/248336#M74115</guid>
      <dc:creator>rashid47010</dc:creator>
      <dc:date>2016-06-21T12:44:21Z</dc:date>
    </item>
  </channel>
</rss>

