All Apps and Add-ons

Parsing AWS Managed Active Directory logs

Path Finder

Hi Team,

Need help in parsing AWS Managed Active Directory

AD Team is writing logs to cloudwatch, and we have Splunk Addon for AWS which consumes these logs through Kinesis stream. 
I have props config to convert the logs to xmlwineventlog sourcetype after which data is parsed but not all the fields. I want the addon to parse using the source [xmlwineventlog:security] but that is not happening,


Here is my props config


And transforms as below

FORMAT = sourcetype::xmlwineventlog
DEST_KEY = MetaData:Sourcetype

FORMAT = source::xmlwineventlog:security
DEST_KEY = MetaData:Source

It is getting changed on sourcetype and source, but parsing is happening based on sourcetype as per windows addon and not on source

Hope i made it clear, please help

Labels (1)
0 Karma
Get Updates on the Splunk Community!

The Splunk Success Framework: Your Guide to Successful Splunk Implementations

Splunk Lantern is a customer success center that provides advice from Splunk experts on valuable data ...

Splunk Training for All: Meet Aspiring Cybersecurity Analyst, Marc Alicea

Splunk Education believes in the value of training and certification in today’s rapidly-changing data-driven ...

Investigate Security and Threat Detection with VirusTotal and Splunk Integration

As security threats and their complexities surge, security analysts deal with increased challenges and ...