All Apps and Add-ons

Oracle XE 10.2 event logs do not match the current extract pattern

abarbieri
New Member

Hello Balazs,

I am trying to use your app to analyze syslog events generated by Oracle XE 10.2. I believe the extract pattern in props.conf seems not be able to cope (i.e. no results generated by a query index="oracleaudit" | top oracle_actionname) with payloads like the following two examples:


<134>Jan  5 14:37:57 localhost Oracle Audit[9261]: ACTION : 'ALTER DATABASE OPEN'#012DATABASE USER: '/'#012PRIVILEGE : SYSDBA#012CLIENT USER: oracle#012CLIENT TERMINAL: #012STATUS: 0

<134>Jan  5 14:37:49 localhost Oracle Audit[9255]: ACTION : 'SELECT DECODE(null,'','Total System Global Area','') NAME_COL_PLUS_SHOW_SGA,   SUM(VALUE), DECODE (null,'', 'bytes','') units_col_plus_show_sga FROM V$SGA    UNION ALL    SELECT NAME NAME_COL_PLUS_SHOW_SGA , VALUE,    DECODE (null,'', 'bytes','') units_col_plus_show_sga FROM V$SGA'#012DATABASE USER: '/'#012PRIVILEGE : SYSDBA#012CLIENT USER: oracle#012CLIENT TERMINAL: #012STATUS: 0

using the simple query index="oracleaudit" does return the expected events.

Any insight?

Thanks,
andrea

Tags (1)
0 Karma

bvamos
Explorer

This version of Oracle is not yet supported. I'll take a look at it and put it on my roadmap...

0 Karma

abarbieri
New Member

I just realised I should have used 'Review' rather than 'Ask a Question' for the Oracle Audit Trail app.

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...