Getting Data In

Collecting Windows eventlogs with whitelist based on word

ArsenyKapralov
Path Finder

Hi

I need to collect all Windows security logs from my infrastructure with Splunk UF installed which include specific Keyword
I'm using following config for Splunk add-on for Windows, but this results in collecting all logs from server.

[WinEventLog://Security]
disabled = 0
start_from = oldest
current_only = 0
checkpointInterval = 5
whitelist1 = (?msi)^Workstation\s+Name\:\s+KEYWORD
index = wineventlog
renderXml=false

How can I do this correctly?

0 Karma

ddrillic
Ultra Champion

You should be able to do it provided you have the event field name.
The syntax is -

whilelist = <list> | key=regex [key=regex]

You have so far -

whitelist1 = (?msi)^Workstation\s+Name\:\s+KEYWORD

Based on the doc you provided at Monitor Windows event log data
you need to identify the key -

alt text

0 Karma

gcusello
SplunkTrust
SplunkTrust

Yes in this way you take all security eventlogs.
if you want not all logs but only the ones that contain specific words, you have to filter them using props.conf and transforms.conf on your indexer.
Bye.
Giuseppe

0 Karma

ArsenyKapralov
Path Finder

Yes, this is traditional way for doing this, but it impacts performance of indexers.

As I found in docs (http://docs.splunk.com/Documentation/Splunk/6.4.2/Data/MonitorWindowseventlogdata) I have ability to filter some logs on UF side and filter could be based on regex.
So my question is what am I doing wrong in my example and how to make it working?

0 Karma

gcusello
SplunkTrust
SplunkTrust

For my Splunk knowledge, Universal Forwarders don't parse logs, parsing is done by Heavy Forwarders and Indexers.

There are two ways to don't parse logs on the Indexer:

  • put an Heavy Forwarder between Universal Forwarders and Indexer and use it to filter logs,
  • get logs not directly from wineventlog but from a script that runs on the Universal Forwarder and writes the filtered logs in a file.

Bye.
Giuseppe

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...