<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to collect Windows event logs and field extractions without using a universal forwarder? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209073#M61061</link>
    <description>&lt;P&gt;In my situation, installing a universal forwarder is NOT an option for the remote Windows machine.  I am using snare to bring them in and the sourcetype of windows_snare_syslog, however there are no field extractions.  After a lot of research to try and get a solution to extract fields for the event logs, I set up Spunk Enterprise to run on Windows, however, still no extractions. All of the windows-related apps I have tried seem to assume or need you to get the logs from a Splunk forwarder. &lt;/P&gt;

&lt;P&gt;Can you advise what specific app to use or other settings to get the field extractions working?&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 07:11:35 GMT</pubDate>
    <dc:creator>hopnscotch</dc:creator>
    <dc:date>2020-09-29T07:11:35Z</dc:date>
    <item>
      <title>How to collect Windows event logs and field extractions without using a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209073#M61061</link>
      <description>&lt;P&gt;In my situation, installing a universal forwarder is NOT an option for the remote Windows machine.  I am using snare to bring them in and the sourcetype of windows_snare_syslog, however there are no field extractions.  After a lot of research to try and get a solution to extract fields for the event logs, I set up Spunk Enterprise to run on Windows, however, still no extractions. All of the windows-related apps I have tried seem to assume or need you to get the logs from a Splunk forwarder. &lt;/P&gt;

&lt;P&gt;Can you advise what specific app to use or other settings to get the field extractions working?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:11:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209073#M61061</guid>
      <dc:creator>hopnscotch</dc:creator>
      <dc:date>2020-09-29T07:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to collect Windows event logs and field extractions without using a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209074#M61062</link>
      <description>&lt;P&gt;You configured the custom field extractions (after your research) on Search Head for your sourcetype windows_snare_syslog, correct? Are you using any in-built dashboard searches which might be referring to different index/sourcetype?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:11:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209074#M61062</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2020-09-29T07:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to collect Windows event logs and field extractions without using a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209075#M61063</link>
      <description>&lt;P&gt;So to be clear.. I haven't done any custom extractions myself as I don't want to spend a ton of time on something that I would assume is already available somewhere.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2015 12:44:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209075#M61063</guid>
      <dc:creator>hopnscotch</dc:creator>
      <dc:date>2015-09-11T12:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to collect Windows event logs and field extractions without using a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209076#M61064</link>
      <description>&lt;P&gt;The &lt;A href="https://splunkbase.splunk.com/app/742/#/overview"&gt;Splunk App-on for Windows&lt;/A&gt; has extractions for Snare syslog with a sourcetype of &lt;CODE&gt;Snare:Security&lt;/CODE&gt; or &lt;CODE&gt;Snare:Application&lt;/CODE&gt; etc.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2015 13:53:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209076#M61064</guid>
      <dc:creator>dturnbull_splun</dc:creator>
      <dc:date>2015-09-11T13:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to collect Windows event logs and field extractions without using a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209077#M61065</link>
      <description>&lt;P&gt;The add-on is just for the local system, not for remote snare logs coming in. &lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2015 19:27:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209077#M61065</guid>
      <dc:creator>hopnscotch</dc:creator>
      <dc:date>2015-09-11T19:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to collect Windows event logs and field extractions without using a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209078#M61066</link>
      <description>&lt;P&gt;Hi ALL,&lt;BR /&gt;
I can not see sourcetype snare:application or snare:security while go installed app splunk-ta-windows.&lt;BR /&gt;
this case i go monitoring log file from rsyslog server.&lt;BR /&gt;
this here use snare agent send syslog to rsyslog server.&lt;BR /&gt;
please clear help me how to parsing this log file windows use format snare agent.&lt;BR /&gt;
many thanks your suppott&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2018 08:30:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-collect-Windows-event-logs-and-field-extractions-without/m-p/209078#M61066</guid>
      <dc:creator>thuyentv2591</dc:creator>
      <dc:date>2018-01-26T08:30:51Z</dc:date>
    </item>
  </channel>
</rss>

