Is it possible to forward collected logs from a Windows Event Collector (WEC) server, i.e. from the Windows service that remotely collects logs from other windows servers, such that the logs are compatible with "Splunk App for Windows Infrastructure" ?
I imagaine that at a minimum this would require "transforming" the default fields of host, source, sourcetype to meaningful values rather than the values that WEC uses. Would this then allow the events to be processed by the "Splunk Add-On for Windows" ?
I know that the recommended method is to use a Universal Forwarder on all servers, or alternatively WMI, but as WEC has been around for a long time I am surprised there is no mention of it here ...
Any information about anybody's experiences is much appreciated.
There are a couple of reasons I am trying to avoid that:
a) the logs are already collected (for another purpose) from the clients on a Windows Event Collector server using the inbuilt Windows Event Forwarding. Collecting them again using a Universal Forwarder would just be doubling the load on those clients and "duplicating" the traffic.
b) to avoid the administrative and cost overhead in organising the installation and update of the Forwarder in an environment managed by an outsourced provider.
Hi @mikaelbje, what would you recommend instead of using Windows Event Collectors? Is the alternative simply installing a universal forwarder on every endpoint?