I have exported evt files on Windows. I would like to index it by splunk. I know splunk on windows can index their own windows application and system, security logs. But I am not sure how to import exported evt files to windows event viewer in order to index them by splunk. Could somebody help to achieve this? Thank you in advance.
For one time activity is there any way to upload the imported eventviewer logs in evtx format for analysis.
Actually Splunk supports monitoring evtx files as described here:
http://docs.splunk.com/Documentation/Splunk/4.3.1/Data/MonitorWindowsdata#Index_exported_event_log_....
you would need to convert evtx file in a Splunk friendly format such as xml using wevtutil
For example:
wevtutil qe /lf yourlog.evtx > yourlog.xml
You can import xml file by using Splunk input manager and defining you own sourcetype:
Manader->Data Inputs->Files and Directories -> Start a new source type
Select
BREAK_ONLY_BEFORE=<Event
NO_BINARY_CHECK=1
SHOULD_LINEMERGE=true
TIME_PREFIX=SystemTime=
Note that xml event contains only bare xml data, while Windows event viewer also adds metadata to it, such as error message text. It might be possible to add this information while exporting logs (it offers saving language specific information during export), but I didn't try that.
I am thinking both cases. Do you know how I need to configure configuration file like props.conf. Windows eventlog is binary, so I think I need to configure something to index the eventlog by one-time upload or set up a file/directory. Could you kindly help?
Is this a one-time upload, or will you need to read these files on an ongoing basis? If it's one-time, you can probably use the Manager in Splunk Web to read them in. If it's ongoing, you may need to set up a file/directory monitor.