<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Windows Events Log in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35626#M7821</link>
    <description>&lt;P&gt;Hello list,&lt;/P&gt;

&lt;P&gt;i have a requirement where i imported Windows Event log (CSV format) into splunk, and now i need to extract specific fields out of that log.
i tried field extraction, newbie alert, and went no where... will appreciate if someone can help me in this..&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;requirement&lt;/STRONG&gt;
need to report on Logon id and Workstation type used by that Logon ID.&lt;/P&gt;

&lt;P&gt;here's how the logs look like:&lt;/P&gt;

&lt;P&gt;1:02:58.000 PM  Information 12/30/2010 1:02:58 PM   Microsoft-Windows-Security-Auditing 4624    Logon   "An account was successfully logged on.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Subject:

    Security ID:        SYSTEM

    Account Name:       XXXXXXXX

    Account Domain:     CORP

    Logon ID:       0x3e7

Logon Type:         8

New Logon:

    Security ID:        XXXX\XXXXX

    Account Name:       EEEEEEE

    Account Domain:     CORP

    Logon ID:       0x1d34affb6

    Logon GUID:     {8BBCB019-8C3B-F16A-8DBB-702C6D5840DE}

Process Information:

    Process ID:     0x2694

    Process Name:       C:\Windows\System32\inetsrv\w3wp.exe

Network Information:

    Workstation Name:   XXXXXXX

    Source Network Address: 11.11.11.11

    Source Port:        11099

Detailed Authentication Information:

    Logon Process:      Advapi  

    Authentication Package: Negotiate

    Transited Services: -

    Package Name (NTLM only):   -

    Key Length:     0
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Sat, 29 Jan 2011 05:37:49 GMT</pubDate>
    <dc:creator>ashishv</dc:creator>
    <dc:date>2011-01-29T05:37:49Z</dc:date>
    <item>
      <title>Windows Events Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35626#M7821</link>
      <description>&lt;P&gt;Hello list,&lt;/P&gt;

&lt;P&gt;i have a requirement where i imported Windows Event log (CSV format) into splunk, and now i need to extract specific fields out of that log.
i tried field extraction, newbie alert, and went no where... will appreciate if someone can help me in this..&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;requirement&lt;/STRONG&gt;
need to report on Logon id and Workstation type used by that Logon ID.&lt;/P&gt;

&lt;P&gt;here's how the logs look like:&lt;/P&gt;

&lt;P&gt;1:02:58.000 PM  Information 12/30/2010 1:02:58 PM   Microsoft-Windows-Security-Auditing 4624    Logon   "An account was successfully logged on.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Subject:

    Security ID:        SYSTEM

    Account Name:       XXXXXXXX

    Account Domain:     CORP

    Logon ID:       0x3e7

Logon Type:         8

New Logon:

    Security ID:        XXXX\XXXXX

    Account Name:       EEEEEEE

    Account Domain:     CORP

    Logon ID:       0x1d34affb6

    Logon GUID:     {8BBCB019-8C3B-F16A-8DBB-702C6D5840DE}

Process Information:

    Process ID:     0x2694

    Process Name:       C:\Windows\System32\inetsrv\w3wp.exe

Network Information:

    Workstation Name:   XXXXXXX

    Source Network Address: 11.11.11.11

    Source Port:        11099

Detailed Authentication Information:

    Logon Process:      Advapi  

    Authentication Package: Negotiate

    Transited Services: -

    Package Name (NTLM only):   -

    Key Length:     0
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 29 Jan 2011 05:37:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35626#M7821</guid>
      <dc:creator>ashishv</dc:creator>
      <dc:date>2011-01-29T05:37:49Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35627#M7822</link>
      <description>&lt;P&gt;ahhh i dont know how this got formatted... all these vars are in separate lines.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Jan 2011 05:38:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35627#M7822</guid>
      <dc:creator>ashishv</dc:creator>
      <dc:date>2011-01-29T05:38:51Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35628#M7823</link>
      <description>&lt;P&gt;Hm, that doesn't really look like proper CSV - for instance it doesn't have commas separating the fields!&lt;/P&gt;

&lt;P&gt;But, the following regex should work for extracting the Logon ID:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Logon ID:\s*(?&amp;lt;logon_id&amp;gt;)\S+)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And correspondingly for Workstation Name:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Workstation Name:\s*(?&amp;lt;workstation_name&amp;gt;\S+)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Apply this using either the interactive field extractor, or by using the &lt;CODE&gt;rex&lt;/CODE&gt; operator.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Jan 2011 05:43:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35628#M7823</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2011-01-29T05:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35629#M7824</link>
      <description>&lt;P&gt;my bad, this is not a CSV, Windows Event log  is saved as text log, and i imported in the splunk monitor using upload a local file.&lt;/P&gt;

&lt;P&gt;not sure how to attach a file with this question...&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2011 00:29:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35629#M7824</guid>
      <dc:creator>ashishv</dc:creator>
      <dc:date>2011-02-01T00:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35630#M7825</link>
      <description>&lt;P&gt;Are these separate lines treated as separate events as well now, or do you have some line breaking rules in place that make sure they're all part of the same event? If it's the former I'd suggest that you look into the transaction command, perhaps something like "| transaction startswith='Subject:'". In the latter case the field extractions should work fine.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2011 05:09:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35630#M7825</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2011-02-01T05:09:45Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35631#M7826</link>
      <description>&lt;P&gt;Do you have the Windows app installed?  If not, I believe it should take care of all of these extractions for you.  You can install it even if your splunk instance is on *nix.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2011 08:01:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Events-Log/m-p/35631#M7826</guid>
      <dc:creator>mw</dc:creator>
      <dc:date>2011-02-02T08:01:15Z</dc:date>
    </item>
  </channel>
</rss>

