All Apps and Add-ons

Parsing AWS Managed Active Directory logs

sun1000
Path Finder

Hi Team,

Need help in parsing AWS Managed Active Directory

AD Team is writing logs to cloudwatch, and we have Splunk Addon for AWS which consumes these logs through Kinesis stream. 
I have props config to convert the logs to xmlwineventlog sourcetype after which data is parsed but not all the fields. I want the addon to parse using the source [xmlwineventlog:security] but that is not happening,

 

Here is my props config

[source://*securitylogs]
Transforms-Index=override_st_props,override_source_props

And transforms as below

[override_st_props]
REGEX=.
FORMAT = sourcetype::xmlwineventlog
DEST_KEY = MetaData:Sourcetype

[override_source_props]
REGEX = .
FORMAT = source::xmlwineventlog:security
DEST_KEY = MetaData:Source

It is getting changed on sourcetype and source, but parsing is happening based on sourcetype as per windows addon and not on source

Hope i made it clear, please help

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...