<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do you route windows event logs based on filters on a heavy forwarder? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452045#M128003</link>
    <description>&lt;P&gt;What does your HF props.conf look like?&lt;/P&gt;</description>
    <pubDate>Thu, 25 Oct 2018 07:27:21 GMT</pubDate>
    <dc:creator>FrankVl</dc:creator>
    <dc:date>2018-10-25T07:27:21Z</dc:date>
    <item>
      <title>How do you route windows event logs based on filters on a heavy forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452044#M128002</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;We have had this working in the past, but for some reason, now, i am unable to forward filtered events to one Tcp group.&lt;/P&gt;

&lt;P&gt;Both the output groups receive all events.&lt;/P&gt;

&lt;P&gt;To summarize, the UF to send winevent:security to tcpout:hf group, HF to route winevent security logs based on the eventcode filters to indexers and syslog archivers.&lt;/P&gt;

&lt;P&gt;but i am receiving all event codes to indexers as well as syslog.&lt;/P&gt;

&lt;P&gt;On UF:&lt;BR /&gt;
&lt;STRONG&gt;Inputs:&lt;/STRONG&gt;&lt;BR /&gt;
[WinEventLog://Security]&lt;BR /&gt;
_TCP_ROUTING=HF&lt;BR /&gt;
disabled = false&lt;BR /&gt;
index=idx1&lt;BR /&gt;
start_from = oldest&lt;BR /&gt;
current_only = 1&lt;BR /&gt;
evt_resolve_ad_obj = 1&lt;BR /&gt;
checkpointInterval = 5&lt;/P&gt;

&lt;P&gt;[WinEventLog://Application]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
index = idx1&lt;BR /&gt;
start_from = oldest&lt;BR /&gt;
current_only = 0&lt;BR /&gt;
checkpointInterval = 5&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Outputs:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;[tcpout]&lt;BR /&gt;
defaultGroup = indexers&lt;BR /&gt;
forceTimebasedAutoLB=true&lt;BR /&gt;
useACK = true&lt;BR /&gt;
autoLBFrequency=15&lt;/P&gt;

&lt;P&gt;[tcpout:indexers]&lt;BR /&gt;
server = idx1:9997, idx2:9997, idx3:9997, idx4:9997, idx5:9997, idx6:9997&lt;/P&gt;

&lt;P&gt;[tcpout:HF]&lt;BR /&gt;
autoLB=true&lt;BR /&gt;
server = HF1:9997,HF2:9997&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;HF Outputs&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;[tcpout]&lt;/P&gt;

&lt;H1&gt;defaultGroup = indexers&lt;/H1&gt;

&lt;P&gt;forceTimebasedAutoLB=true&lt;BR /&gt;
useACK = true&lt;BR /&gt;
autoLBFrequency=15&lt;BR /&gt;
forwardedindex.2.whitelist = (_audit|_introspection|_telemetry|_internal)&lt;/P&gt;

&lt;P&gt;[indexAndForward]&lt;BR /&gt;
index=false&lt;/P&gt;

&lt;P&gt;[tcpout:indexers]&lt;BR /&gt;
server = idx1:9997, idx2:9997, idx3:9997, idx4:9997, idx5:9997, idx6:9997&lt;/P&gt;

&lt;P&gt;[syslog] &lt;STRONG&gt;## syslog outputs for archive##&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;[syslog:syslogGroup]&lt;BR /&gt;
disabled=false&lt;BR /&gt;
server=syslog:514&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;HF Transforms&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;[WinSecEvent-Splunk-SubSet]&lt;BR /&gt;
REGEX = (?m)^EventCode=(4634|4776) &lt;STRONG&gt;&lt;EM&gt;# need to forward selected events to indexers&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;

&lt;H1&gt;REGEX = (?m)^(.&lt;EM&gt;EventCode=(4634|4776).&lt;/EM&gt;)&lt;/H1&gt;

&lt;P&gt;DEST_KEY=_TCP_ROUTING&lt;BR /&gt;
FORMAT=indexers&lt;/P&gt;

&lt;P&gt;[WinSecEvent-Syslog-All]&lt;BR /&gt;
REGEX = (.)  &lt;STRONG&gt;&lt;EM&gt;# Archive all event  codes on a syslog archive&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;
DEST_KEY=_SYSLOG_ROUTING&lt;BR /&gt;
FORMAT=syslogGroup&lt;/P&gt;

&lt;P&gt;What am i missing &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Thanks in Advance!!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 21:47:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452044#M128002</guid>
      <dc:creator>shivarpith</dc:creator>
      <dc:date>2020-09-29T21:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: How do you route windows event logs based on filters on a heavy forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452045#M128003</link>
      <description>&lt;P&gt;What does your HF props.conf look like?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 07:27:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452045#M128003</guid>
      <dc:creator>FrankVl</dc:creator>
      <dc:date>2018-10-25T07:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: How do you route windows event logs based on filters on a heavy forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452046#M128004</link>
      <description>&lt;P&gt;Looks like i missed sending that.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;HF Props&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;
[WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-routing=WinSecEvent-Syslog-All,WinSecEvent-Splunk-SubSet&lt;BR /&gt;
SEDCMD = s/[\t\n\r]/ /g&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 11:09:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452046#M128004</guid>
      <dc:creator>shivarpith</dc:creator>
      <dc:date>2018-10-25T11:09:19Z</dc:date>
    </item>
    <item>
      <title>Re: How do you route windows event logs based on filters on a heavy forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452047#M128005</link>
      <description>&lt;P&gt;Are you sure that sourcetype is correct? I know the TA for Windows assigns sourcetypes like that based on transforms, but that is too late for this props.conf to work. Not 100% sure anymore what the sourcetype will be before that transforms applies...&lt;/P&gt;

&lt;P&gt;Does that SEDCMD work properly for you?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 11:28:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452047#M128005</guid>
      <dc:creator>FrankVl</dc:creator>
      <dc:date>2018-10-25T11:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: How do you route windows event logs based on filters on a heavy forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452048#M128006</link>
      <description>&lt;P&gt;Can you please check &lt;CODE&gt;$SPLUNK_HOME/var/log/splunk/metrics.log&lt;/CODE&gt; on Indexers and check whether you are receiving &lt;CODE&gt;WinEventLog:Security&lt;/CODE&gt; source OR sourcetype from UF ?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 11:42:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452048#M128006</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2018-10-25T11:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: How do you route windows event logs based on filters on a heavy forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452049#M128007</link>
      <description>&lt;P&gt;I am receiving winevent:security logs from these machines to splunk,&lt;/P&gt;

&lt;P&gt;my concern is that, i am unable to filter based on the event codes as suggested in splunk docs and answers. i am getting all event codes to splunk which i do not want. i only want a specific set of event codes that i can add in HF transforms.&lt;/P&gt;

&lt;P&gt;INFO  Metrics - group=per_sourcetype_thruput, series="wineventlog:security", kbps=0.06895835463992131, eps=0.06451654193812648, kb=2.1376953125, ev=2, avg_age=2, max_age=2&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 21:45:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452049#M128007</guid>
      <dc:creator>shivarpith</dc:creator>
      <dc:date>2020-09-29T21:45:30Z</dc:date>
    </item>
    <item>
      <title>Re: How do you route windows event logs based on filters on a heavy forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452050#M128008</link>
      <description>&lt;P&gt;SEDCMD is working as expected.&lt;/P&gt;

&lt;P&gt;HF is only acting as a relay so it should carry the sourcetype to further output groups.&lt;BR /&gt;
it for some reason is either unable to apply the transforms or is unable to regex defined in the transforms.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Oct 2018 14:41:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-route-windows-event-logs-based-on-filters-on-a-heavy/m-p/452050#M128008</guid>
      <dc:creator>shivarpith</dc:creator>
      <dc:date>2018-10-26T14:41:25Z</dc:date>
    </item>
  </channel>
</rss>

