Getting Data In

How to process event exact same for events from multiple event source type?

tonopahtaos
Path Finder

Let us say you have following lines in your props.conf file:

[WinEventLog:Security]

REPORT-common = user-account-change

REPORT-win-2k3 = group-type-change

You have another event source type ABC which generates exact same events as WinEvnetLog:Security so you want to apply the same transforms to it. You can do so by adding following lines to your props.conf file:

[ABC]

REPORT-common = user-account-change

REPORT-win-2k3 = group-type-change

This duplicates these REPORT-* entries. Is it possible to support more than one source types in props.conf for the same transform items? An example is:

[WinEventLog:Security],[ABC]

REPORT-common = user-account-change

REPORT-win-2k3 = group-type-change

Tags (1)
0 Karma
1 Solution

sowings
Splunk Employee
Splunk Employee

The type of re-use you're talking about does occur in the transforms. While it's true that you have to reference each transform (i.e., "user-account-change") for each applicable sourcetype in props.conf, you're reusing the regular expression rule itself which appears in transforms.conf. Specifically with regards to Windows Event Logs, you might consider checking the source of these events in your results. It may be possible to use a single props.conf stanza (like [source::(WMI:WinEventLog|WinEventLog)...] based on source--think input path). An example of this is found in the Splunk for Windows Technology Add-on.

View solution in original post

sowings
Splunk Employee
Splunk Employee

The type of re-use you're talking about does occur in the transforms. While it's true that you have to reference each transform (i.e., "user-account-change") for each applicable sourcetype in props.conf, you're reusing the regular expression rule itself which appears in transforms.conf. Specifically with regards to Windows Event Logs, you might consider checking the source of these events in your results. It may be possible to use a single props.conf stanza (like [source::(WMI:WinEventLog|WinEventLog)...] based on source--think input path). An example of this is found in the Splunk for Windows Technology Add-on.

sowings
Splunk Employee
Splunk Employee

No problem. Note that it seems that the "..." is only available for matches beginning with [source: ], kind of like using ... in inputs.conf.

0 Karma

tonopahtaos
Path Finder

[source::(WMI:WinEventLog|WinEventLog)...] is working for me.

I tried using regex yesterday and were not lucky. The ... is the key to work.

Thanks a lot.

0 Karma

tonopahtaos
Path Finder

The WMI:WinEventLog:Security has exact same events as WinEventLog:Security.

0 Karma

kristian_kolb
Ultra Champion

To the best of my knowledge that is not possible. Also, as far as I know, there are no other applications than the Windows OS that produce the same kind of events as WinEventLog:Security.

Are you sure that you should have different sourcetypes for this data? If the format of the events are the same, then it generally IS the same sourcetype. That is pretty much the idea behind sourcetypes. Then you can have just one props.conf stanza.

/kristian

tonopahtaos
Path Finder

The WMI:WinEventLog:Security has exact same events as WinEventLog:Security.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...

Network to App: Observability Unlocked [May & June Series]

In today’s digital landscape, your environment is no longer confined to the data center. It spans complex ...

SPL2 Deep Dives, AppDynamics Integrations, SAML Made Simple and Much More on Splunk ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...