<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Route Windows events in RFC3614 format to splunk and Syslog format to syslog reciever. in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Route-Windows-events-in-RFC3614-format-to-splunk-and-Syslog/m-p/429328#M75217</link>
    <description>&lt;P&gt;hi,&lt;/P&gt;

&lt;P&gt;we are trying to route windows security event logs from UF's to Splunk indexers and also to a syslog aggregator.&lt;/P&gt;

&lt;P&gt;we would like to read the event log only once on the UF and are using a HF as interim relay to route data to desired locations.&lt;/P&gt;

&lt;P&gt;On UF we have the Splunk_TA_Windows application deployed&lt;/P&gt;

&lt;P&gt;On HF  we have a outputs.conf:&lt;BR /&gt;
[tcpout]&lt;BR /&gt;
connectionTimeout = 45&lt;BR /&gt;
defaultGroup      = all_indexers&lt;BR /&gt;
forwardedindex.0.whitelist = .*&lt;/P&gt;

&lt;P&gt;[tcpout:all_indexers]&lt;BR /&gt;
autoLB = true&lt;BR /&gt;
server = IDX1:9997, IDX2:9997&lt;/P&gt;

&lt;P&gt;[syslog]&lt;BR /&gt;
connectionTimeout = 45&lt;/P&gt;

&lt;P&gt;[syslog:clf_syslog_group]&lt;BR /&gt;
server = Syslog1:514&lt;/P&gt;

&lt;P&gt;Props.conf&lt;BR /&gt;
[WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-routing = WinSecEvent-Splunk,WinSecEvent-Syslog&lt;BR /&gt;
SEDCMD = s/[\t\n\r]/ /g&lt;BR /&gt;
TRUNCATE = 0&lt;/P&gt;

&lt;P&gt;Transforms.conf&lt;/P&gt;

&lt;P&gt;[WinSecEvent-Splunk]&lt;BR /&gt;
REGEX = (.)&lt;BR /&gt;
DEST_KEY = _TCP_ROUTING&lt;BR /&gt;
FORMAT = all_indexers&lt;/P&gt;

&lt;P&gt;[WinSecEvent-Syslog]&lt;BR /&gt;
REGEX = (.)&lt;BR /&gt;
DEST_KEY = _SYSLOG_ROUTING&lt;BR /&gt;
FORMAT = clf_syslog_group&lt;/P&gt;

&lt;P&gt;The above configuration works fine until the part where it routes data to  different output groups.&lt;/P&gt;

&lt;P&gt;However, I would like the splunk indexed logs would still be in the RFC 3614 or splunk parsed format but have events on syslog as normalized using above props.&lt;/P&gt;

&lt;P&gt;is this a possibility? how do we apply two parsing patterns for one sourcetype? - maybe based on the output group?&lt;/P&gt;

&lt;P&gt;please advise.&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 01:37:26 GMT</pubDate>
    <dc:creator>shivarpith</dc:creator>
    <dc:date>2020-09-30T01:37:26Z</dc:date>
    <item>
      <title>Route Windows events in RFC3614 format to splunk and Syslog format to syslog reciever.</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Route-Windows-events-in-RFC3614-format-to-splunk-and-Syslog/m-p/429328#M75217</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;

&lt;P&gt;we are trying to route windows security event logs from UF's to Splunk indexers and also to a syslog aggregator.&lt;/P&gt;

&lt;P&gt;we would like to read the event log only once on the UF and are using a HF as interim relay to route data to desired locations.&lt;/P&gt;

&lt;P&gt;On UF we have the Splunk_TA_Windows application deployed&lt;/P&gt;

&lt;P&gt;On HF  we have a outputs.conf:&lt;BR /&gt;
[tcpout]&lt;BR /&gt;
connectionTimeout = 45&lt;BR /&gt;
defaultGroup      = all_indexers&lt;BR /&gt;
forwardedindex.0.whitelist = .*&lt;/P&gt;

&lt;P&gt;[tcpout:all_indexers]&lt;BR /&gt;
autoLB = true&lt;BR /&gt;
server = IDX1:9997, IDX2:9997&lt;/P&gt;

&lt;P&gt;[syslog]&lt;BR /&gt;
connectionTimeout = 45&lt;/P&gt;

&lt;P&gt;[syslog:clf_syslog_group]&lt;BR /&gt;
server = Syslog1:514&lt;/P&gt;

&lt;P&gt;Props.conf&lt;BR /&gt;
[WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-routing = WinSecEvent-Splunk,WinSecEvent-Syslog&lt;BR /&gt;
SEDCMD = s/[\t\n\r]/ /g&lt;BR /&gt;
TRUNCATE = 0&lt;/P&gt;

&lt;P&gt;Transforms.conf&lt;/P&gt;

&lt;P&gt;[WinSecEvent-Splunk]&lt;BR /&gt;
REGEX = (.)&lt;BR /&gt;
DEST_KEY = _TCP_ROUTING&lt;BR /&gt;
FORMAT = all_indexers&lt;/P&gt;

&lt;P&gt;[WinSecEvent-Syslog]&lt;BR /&gt;
REGEX = (.)&lt;BR /&gt;
DEST_KEY = _SYSLOG_ROUTING&lt;BR /&gt;
FORMAT = clf_syslog_group&lt;/P&gt;

&lt;P&gt;The above configuration works fine until the part where it routes data to  different output groups.&lt;/P&gt;

&lt;P&gt;However, I would like the splunk indexed logs would still be in the RFC 3614 or splunk parsed format but have events on syslog as normalized using above props.&lt;/P&gt;

&lt;P&gt;is this a possibility? how do we apply two parsing patterns for one sourcetype? - maybe based on the output group?&lt;/P&gt;

&lt;P&gt;please advise.&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:37:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Route-Windows-events-in-RFC3614-format-to-splunk-and-Syslog/m-p/429328#M75217</guid>
      <dc:creator>shivarpith</dc:creator>
      <dc:date>2020-09-30T01:37:26Z</dc:date>
    </item>
  </channel>
</rss>

