All Apps and Add-ons

evtsys to syslog for windows events

coreyf311
Path Finder

collecting windows logs using evtsys and forwarding to a syslog server. I have a UF installed on the universal forwarder reading the windows logs created by evtsys. I have tried using sourcetype=WinEventLog:Security but the logs do not match what I see in the samples directory from the Splunk_TA_windows apps so these events are not extracted per the app. Is there a TA or sourcetype i can use to get evtsys logs parsed correclty? trying to avoid a custom props/transforms from scratch to parse all this data.

Tags (1)
0 Karma

efika
Communicator

Did you manage to find a solution other than writing your own props/transforms ?

0 Karma

FrankVl
Ultra Champion

Can you perhaps share a few sample logs, for those of us not familiar with evtsys? Perhaps someone recognizes it as a format that is supported by some Splunk add-on or one of the sourcetypes supported by Splunk TA Windows (perhaps it looks like snare logs?).

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...