Getting Data In

For WinEventLog://Security, how to use "renderXml=true" for some EventCodes but "renderXml=false" for others?

woodcock
Esteemed Legend

I know the "simplest" way is to stand up a second instance of Splunk and have completely different values for renderXml and whitelist between the two but this is not an option for us; I need a single-instance solution. We are planning on using renderXml for most events because it has impeccible field extraction so we don't need to build that part. The problem is that the UAC transitions are not translated; we get an old UAC value and a new one and even then there appears to be at least 1 intractable problem with building our own UAC-transistion decoder macro so we are planning not to do that. Instead we would like those events (e.g. EventCode 4738) to be sent in without renderXml (or perhaps sent in both ways) so that we can access Window's plain-text interpretations of the transitions. It would be nice if I could just have multiple stanzas for [WinEventLog://Security] but Splunk Universal Forwarders only act on the last one and will ignore all the other ones.

1 Solution

jkat54
SplunkTrust
SplunkTrust

So here's my idea... put a filter on your security log that filters events of 4738 to another event log.

then mount that sucker in the windows event viewer and start monitoring it with the universal forwarder.

Seems like you could script it from here... Psuedo powershell code below:

get-eventlog | where { $_.eventCode -eq 4738 } | write-eventlog ...

Hopefully these are not super time critical events, so that you can write code to do this for you pretty quickly, and then schedule the code to run every hour or whatever...

View solution in original post

0 Karma

jkat54
SplunkTrust
SplunkTrust

So here's my idea... put a filter on your security log that filters events of 4738 to another event log.

then mount that sucker in the windows event viewer and start monitoring it with the universal forwarder.

Seems like you could script it from here... Psuedo powershell code below:

get-eventlog | where { $_.eventCode -eq 4738 } | write-eventlog ...

Hopefully these are not super time critical events, so that you can write code to do this for you pretty quickly, and then schedule the code to run every hour or whatever...

0 Karma

Rob
Splunk Employee
Splunk Employee

Are you looking to do this exclusively with universal forwarders or have you considered using a heavy forwarder to possibly do some per event parsing before it reaches the indexer?

0 Karma

woodcock
Esteemed Legend

Heavy Indexer is a viable option for us.

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...