All Apps and Add-ons

Index-time field extraction for Windows eventlog

yuwtennis
Communicator

Hi !

I am considering to implement following index-time field extraction for
exported Windows security eventlog.

Substitute computer name as "test".

However, I am bit confused with the steps you need to take.
I beleieve that you need to set the source type of Windows eventlog
as preprosess-winevt when you input the log manually . ( I have an environemnt where you cannot use neither forwarder nor WMI)

I would like to advice for how to set up props.conf and transforms.conf.
Any advice is appreciated!

Thanks,
Yu

0 Karma
1 Solution

lukejadamec
Super Champion

You can copy the logs to a different machine, and then indexing them with a directory monitor, then you can use the monitor source for your index time extraction. The machine that monitors the copied log files needs to run the same version of Windows, for example: W2K8 logs cannot be read by a W2k3 server.

View solution in original post

lukejadamec
Super Champion

You can copy the logs to a different machine, and then indexing them with a directory monitor, then you can use the monitor source for your index time extraction. The machine that monitors the copied log files needs to run the same version of Windows, for example: W2K8 logs cannot be read by a W2k3 server.

Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...