I am trying to ingest Windows Event (Application, Security, System) logs into Logstash that were pulled from an offline Windows system; ELK is running on a separate offline system. The logs were saved in XML format (snippet below). I have tried multiple methods, found both on this Forum and StackOverflow, to parse all of the Windows Event fields (Computer name, IP, EventID, etc), but with each attempt, the individual fields are not being parsed and/or added as Fields in Kibana to filter on.
<?xml version="1.0" encoding="UTF-8" standalone="true"?>
<Events>
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Redacted"/>
<EventID Qualifiers="16384">1704</EventID>
<Level>4</Level>
<Task>0</Task>
<Keywords>0x80000000000000</Keywords>
<TimeCreated SystemTime="2018-05-02T16:13:47.000000000Z"/>
<EventRecordID>10052</EventRecordID>
<Channel>Application</Channel>
<Computer>COMPUTER.LOCAL</Computer>
<Security/>
</System>
<EventData>
<Data/>
</EventData>
</Event>
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Windows Error Reporting"/>
<EventID Qualifiers="0">1001</EventID>
<Level>4</Level>
..........
</Event>