Getting Data In

How to index .evtx files and put them in their own index

nls7010
Path Finder

I have read all of the above, but I think I'm confused on just what to do to get the indexing going.

We are wanting to pick up the following path on some of our windows servers: %SystemRoot%\System32\Winevt\Logs\Application.evtx , but I'm not certain what to put in the sourcetype for those files.
Can I select an index rather than the main (which we don't want to use)?

Any assistance would be helpful, thank you!

0 Karma

jnudell_2
Builder

Hi @nls7010 ,
Don't try to ingest the Windows event logs directly. You'll want to use the Windows TA for Splunk (https://splunkbase.splunk.com/app/742/#/overview) and then refer to the documentation for indexing Windows Events from the event log (https://docs.splunk.com/Documentation/WindowsAddOn/6.0.0/User/Configuration).

Specifically you'll want to enable collection for the Application log in inputs.conf on your Windows Universal Forwarder:
inputs.conf

[WinEventLog://Application]
disabled = 0

By default, this input is disabled and will need to be enabled in the local folder of the application (if there is no local folder, you would create one and create an inputs.conf with the lines above)

0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...