Getting Data In

For WinEventLog://Security, how to use "renderXml=true" for some EventCodes but "renderXml=false" for others?

woodcock
Esteemed Legend

I know the "simplest" way is to stand up a second instance of Splunk and have completely different values for renderXml and whitelist between the two but this is not an option for us; I need a single-instance solution. We are planning on using renderXml for most events because it has impeccible field extraction so we don't need to build that part. The problem is that the UAC transitions are not translated; we get an old UAC value and a new one and even then there appears to be at least 1 intractable problem with building our own UAC-transistion decoder macro so we are planning not to do that. Instead we would like those events (e.g. EventCode 4738) to be sent in without renderXml (or perhaps sent in both ways) so that we can access Window's plain-text interpretations of the transitions. It would be nice if I could just have multiple stanzas for [WinEventLog://Security] but Splunk Universal Forwarders only act on the last one and will ignore all the other ones.

1 Solution

jkat54
SplunkTrust
SplunkTrust

So here's my idea... put a filter on your security log that filters events of 4738 to another event log.

then mount that sucker in the windows event viewer and start monitoring it with the universal forwarder.

Seems like you could script it from here... Psuedo powershell code below:

get-eventlog | where { $_.eventCode -eq 4738 } | write-eventlog ...

Hopefully these are not super time critical events, so that you can write code to do this for you pretty quickly, and then schedule the code to run every hour or whatever...

View solution in original post

0 Karma

jkat54
SplunkTrust
SplunkTrust

So here's my idea... put a filter on your security log that filters events of 4738 to another event log.

then mount that sucker in the windows event viewer and start monitoring it with the universal forwarder.

Seems like you could script it from here... Psuedo powershell code below:

get-eventlog | where { $_.eventCode -eq 4738 } | write-eventlog ...

Hopefully these are not super time critical events, so that you can write code to do this for you pretty quickly, and then schedule the code to run every hour or whatever...

0 Karma

Rob
Splunk Employee
Splunk Employee

Are you looking to do this exclusively with universal forwarders or have you considered using a heavy forwarder to possibly do some per event parsing before it reaches the indexer?

0 Karma

woodcock
Esteemed Legend

Heavy Indexer is a viable option for us.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...