<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Forward windows eventlog to 3rd party system in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370993#M67383</link>
    <description>&lt;P&gt;Thanks for your comment.&lt;BR /&gt;
This time, I'd like to use the universal forwarder and actually my outputs.conf was already modified and it didn't work.&lt;BR /&gt;
Do you have any suspicious points?&lt;BR /&gt;
I confirmed the syslog-server is listening on 12345.&lt;/P&gt;</description>
    <pubDate>Mon, 27 Mar 2017 00:45:35 GMT</pubDate>
    <dc:creator>Mtakahashi</dc:creator>
    <dc:date>2017-03-27T00:45:35Z</dc:date>
    <item>
      <title>Forward windows eventlog to 3rd party system</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370987#M67377</link>
      <description>&lt;P&gt;I need to forward windows eventlog of a particular server to 3rd party system (Arcsight) as raw data.&lt;/P&gt;

&lt;P&gt;I created the outputs.conf at local folder and restarted the splunk service.&lt;BR /&gt;
Then, it looks Arcsight only received sort of splunk log and meta data (windows eventlog) was missed out.&lt;/P&gt;

&lt;P&gt;Log forwarding to Splunk server has been working properly.&lt;BR /&gt;
Can you please let me know how can I make this happen..thanks in advance.&lt;/P&gt;

&lt;P&gt;&lt;IMG src="https://community.splunk.com/storage/temp/190193-forward-winlog-to-3rd-party.png" alt="alt text" /&gt;&lt;/P&gt;

&lt;P&gt;Here are some data Arcsight received&lt;BR /&gt;
03-22-2017 19:37:53.078 +0900 INFO  HttpPubSubConnection - Running phone uri=/services/broker/phonehome/connection_192.168.198.100_(port)_(windows host)_A2ED90B0-3C6A-4AB7-8CC0-BAFCB3C9F8D9&lt;BR /&gt;
03-22-2017 19:38:03.613 +0900 INFO  Metrics - group=deploy-client, name=app_downloads, volumeCompletedKB=0.0&lt;BR /&gt;
03-22-2017 19:38:03.613 +0900 INFO  Metrics - group=deploy-connections, nCurrent=0&lt;BR /&gt;
03-22-2017 19:38:03.613 +0900 INFO  Metrics - group=realtime_search_data, system total, drop_count=0&lt;BR /&gt;
03-22-2017 19:37:38.844 +0900 INFO  StatusMgr - destHost=(Splunk Indexer host), destIp=192.168.63.200, destPort=9997, eventType=connect_try, publisher=tcpout, sourcePort=8089, statusee=TcpOutputProcessor&lt;BR /&gt;
03-22-2017 19:37:39.266 +0900 INFO  TcpOutputProc - Connected to idx=192.168.63.200:9997&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:19:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370987#M67377</guid>
      <dc:creator>Mtakahashi</dc:creator>
      <dc:date>2020-09-29T13:19:48Z</dc:date>
    </item>
    <item>
      <title>Re: Forward windows eventlog to 3rd party system</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370988#M67378</link>
      <description>&lt;P&gt;This is internal messages to _internal index of Splunk. Have you configured to just forward the WinEventLog:* to Arcsight?&lt;BR /&gt;
Here you can find information on how to choose the correct data: &lt;A href="https://docs.splunk.com/Documentation/Splunk/6.5.2/Forwarding/Forwarddatatothird-partysystemsd"&gt;https://docs.splunk.com/Documentation/Splunk/6.5.2/Forwarding/Forwarddatatothird-partysystemsd&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2017 12:16:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370988#M67378</guid>
      <dc:creator>gfreitas</dc:creator>
      <dc:date>2017-03-23T12:16:17Z</dc:date>
    </item>
    <item>
      <title>Re: Forward windows eventlog to 3rd party system</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370989#M67379</link>
      <description>&lt;P&gt;Thanks for your comment.&lt;BR /&gt;
Yes, I had looked that information and just modified the outputs.conf &lt;BR /&gt;
Do I need to modify props.conf and transforms.conf ?&lt;BR /&gt;
At this moment, I'm fine to forward all the logs on this win server.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2017 00:42:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370989#M67379</guid>
      <dc:creator>Mtakahashi</dc:creator>
      <dc:date>2017-03-24T00:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: Forward windows eventlog to 3rd party system</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370990#M67380</link>
      <description>&lt;P&gt;Hi, you don`t really need to change the props.conf and transforms.conf unless you want to send just the WinEventLog:* data&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2017 10:39:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370990#M67380</guid>
      <dc:creator>gfreitas</dc:creator>
      <dc:date>2017-03-24T10:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: Forward windows eventlog to 3rd party system</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370991#M67381</link>
      <description>&lt;P&gt;Two ways you can forward&lt;BR /&gt;
1. TCPOUT&lt;BR /&gt;
2. Syslog&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;1. TCPOUT , you can do via Universal Forwarder and is easier.&lt;/STRONG&gt; &lt;BR /&gt;
Just put the settings as below&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[tcpout]

[tcpout:arcsight]
server = 192.168.38.100:12345
sendCookedData = false
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Things to be careful while doing tcpout are&lt;BR /&gt;
- Ensure your outputs queue won't be filled up if the ArcSight SErver is not available. This might impact your indexing&lt;BR /&gt;
- Ensure the syslog-server is listening on 12345 and all firewall is enabled&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;2. Syslog . This requires Heavy Forwarder&lt;/STRONG&gt; &lt;BR /&gt;
For Syslog you need a transforms.conf as below&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[fwd_syslog_to_arcsight]
REGEX = .
DEST_KEY=_SYSLOG_ROUTING
FORMAT=arcsight_out
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and in outputs.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[arcsight_out]
server = 192.168.38.100:12345
priority=NO_PRI
syslogSourceType=helloMrArcSight
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Advantages are &lt;BR /&gt;
- You can send via UDP and don't care about 3rd party system availability&lt;BR /&gt;
- Can stick to RFC standards as per syslog and no one can ask you to modify the data. My advice is NEVER touch on raw data and 3rd parties will demand more &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2017 12:12:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370991#M67381</guid>
      <dc:creator>koshyk</dc:creator>
      <dc:date>2017-03-24T12:12:01Z</dc:date>
    </item>
    <item>
      <title>Re: Forward windows eventlog to 3rd party system</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370992#M67382</link>
      <description>&lt;P&gt;Thanks, I understood I don't have to modify the props.conf and transforms.conf&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 00:40:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370992#M67382</guid>
      <dc:creator>Mtakahashi</dc:creator>
      <dc:date>2017-03-27T00:40:55Z</dc:date>
    </item>
    <item>
      <title>Re: Forward windows eventlog to 3rd party system</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370993#M67383</link>
      <description>&lt;P&gt;Thanks for your comment.&lt;BR /&gt;
This time, I'd like to use the universal forwarder and actually my outputs.conf was already modified and it didn't work.&lt;BR /&gt;
Do you have any suspicious points?&lt;BR /&gt;
I confirmed the syslog-server is listening on 12345.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 00:45:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370993#M67383</guid>
      <dc:creator>Mtakahashi</dc:creator>
      <dc:date>2017-03-27T00:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: Forward windows eventlog to 3rd party system</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370994#M67384</link>
      <description>&lt;P&gt;I confirmed with Splunk support that my configuration seems no issue about using universal forwarder.&lt;BR /&gt;
I guess root cause is not splunk side.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2017 01:02:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-windows-eventlog-to-3rd-party-system/m-p/370994#M67384</guid>
      <dc:creator>Mtakahashi</dc:creator>
      <dc:date>2017-03-28T01:02:01Z</dc:date>
    </item>
  </channel>
</rss>

