Getting Data In

How to import exported windows eventlog to eventviewer for indexing?

Takajian
Builder

I have exported evt files on Windows. I would like to index it by splunk. I know splunk on windows can index their own windows application and system, security logs. But I am not sure how to import exported evt files to windows event viewer in order to index them by splunk. Could somebody help to achieve this? Thank you in advance.

ramya_k
Engager

For one time activity is there any way to upload the imported eventviewer logs in evtx format for analysis.

0 Karma

rovechkin_splun
Splunk Employee
Splunk Employee
0 Karma

rovechkin_splun
Splunk Employee
Splunk Employee
  • you would need to convert evtx file in a Splunk friendly format such as xml using wevtutil
    For example:
    wevtutil qe /lf yourlog.evtx > yourlog.xml

  • You can import xml file by using Splunk input manager and defining you own sourcetype:
    Manader->Data Inputs->Files and Directories -> Start a new source type
    Select .xml and then adjust parsing setting until you get individual events. I ended up with props.conf like following:

BREAK_ONLY_BEFORE=<Event

NO_BINARY_CHECK=1

SHOULD_LINEMERGE=true

TIME_PREFIX=SystemTime=

  • From that point on Splunk should be able to parse xml event natively

Note that xml event contains only bare xml data, while Windows event viewer also adds metadata to it, such as error message text. It might be possible to add this information while exporting logs (it offers saving language specific information during export), but I didn't try that.

Takajian
Builder

I am thinking both cases. Do you know how I need to configure configuration file like props.conf. Windows eventlog is binary, so I think I need to configure something to index the eventlog by one-time upload or set up a file/directory. Could you kindly help?

0 Karma

cphair
Builder

Is this a one-time upload, or will you need to read these files on an ongoing basis? If it's one-time, you can probably use the Manager in Splunk Web to read them in. If it's ongoing, you may need to set up a file/directory monitor.

0 Karma
Get Updates on the Splunk Community!

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...

Brains, Bytes, and Boston: Learn from the Best at .conf25

When you think of Boston, you might picture colonial charm, world-class universities, or even the crack of a ...