We have several NetApps that require log retention. Getting log events to Splunk appears to be an odd configuration. Odd being defined as we haven't done it before.
More environment information.
It may just be we don't know how to use the Windows app correctly. Seems like we have another option as well, mounting the files on a Windows system and having a Universal Forwarder connect to port 9997 on the Splunk system. We have done this successfully on other MS Windows systems.
We want to retain host information. (If these were normal syslog/text files, we could use the directory for the hostname.)
So, what exactly do we need to do to get these files in our Splunk index? We're especially unfamiliar with the Windows App and trans.py.
The files are Windows Event Log binary export files (well in the same format). If you install a Splunk forwarder on Windows (Universal Forwarder or Light), and set it up to forward to your indexer(s), you can simply read/input the .evt files on the forwarder. It will convert them and forward them to your Solaris Splunk instance. The Windows Splunk forwarders have code to recognize and convert the files readably automatically (I think based on the file name extension) and should also have the ability to extract the host from one of the fields (ComputerName I think) in the file.
You can copy/FTP the .evt files to a monitored or batch directory on the forwarder, or mount and monitor another directory where they are written.
The files are Windows Event Log binary export files (well in the same format). If you install a Splunk forwarder on Windows (Universal Forwarder or Light), and set it up to forward to your indexer(s), you can simply read/input the .evt files on the forwarder. It will convert them and forward them to your Solaris Splunk instance. The Windows Splunk forwarders have code to recognize and convert the files readably automatically (I think based on the file name extension) and should also have the ability to extract the host from one of the fields (ComputerName I think) in the file.
You can copy/FTP the .evt files to a monitored or batch directory on the forwarder, or mount and monitor another directory where they are written.
We ended up mounting on a Windows host and forwarding that way.