All Apps and Add-ons

Splunk Add-On for Windows Event Cleanup- What is happening to my data?

mcfabrero_acn
Explorer

Hi All,

I am currently working on ingesting WinEventLog:Security data and noticed that the event has been cleaned up even though I didn't configure the SEDCMD extractions in my props configuration. Please note that the props.conf in my local folder is exactly the same copy of the props.conf in my default folder.

mcfabrero_acn_1-1680516872015.png

I am looking specifically at the certificate information and would like it to be seen in my data in Splunk

mcfabrero_acn_0-1680516618687.png

This is what it looks like in Splunk:

mcfabrero_acn_2-1680517101964.png

I expect to also have the same data as what I have in my source

mcfabrero_acn_3-1680517151508.png

Any idea what happened and how can I troubleshoot to determine what's causing this to my data?

Your help is greatly appreciated.

Thanks in advance!

 

Labels (1)
0 Karma
1 Solution

mcfabrero_acn
Explorer

We have the configurations in the deployment server which I wasn't able to use btool command but I was able to figure out what causes the missing text/lines. Apparently, there are other Windows TA folders configured and  I got to see where the SEDCMD extractions were enabled. I checked the source type configurations in our SH Cloud and found that the extractions were renamed differently instead of having the default 

     SEDCMD-clean_info_text_from_winsecurity_events_certificate_information = s/Certificate information is only[\S\s\r\n]+$//g

it was renamed to SEDCMD-clean2 s/Certificate information is only[\S\s\r\n]+$//g.

Appreciate your response! 🙂

View solution in original post

0 Karma

mcfabrero_acn
Explorer

We have the configurations in the deployment server which I wasn't able to use btool command but I was able to figure out what causes the missing text/lines. Apparently, there are other Windows TA folders configured and  I got to see where the SEDCMD extractions were enabled. I checked the source type configurations in our SH Cloud and found that the extractions were renamed differently instead of having the default 

     SEDCMD-clean_info_text_from_winsecurity_events_certificate_information = s/Certificate information is only[\S\s\r\n]+$//g

it was renamed to SEDCMD-clean2 s/Certificate information is only[\S\s\r\n]+$//g.

Appreciate your response! 🙂

0 Karma

PaulPanther
Motivator

Have you verified with btool that the shown props.conf  setting are applied?

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...