Getting Data In

How to send data to multiple indexes?

KCM
Engager

Hello Experts..

Configuring the inupts.conf file I am trying to send data from the same windows log to multiple index's for separate dashboards. I think some sort precedence is blocking some of the data.

Here is what I was trying to accomplish. Is there a better way to get where I'm trying to go?

 

[WinEventLog://Application]
disabled = 0
index = WINDOWS
start_from = oldest

[WinEventLog://System]
disabled = 0
index = WINDOWS
start_from = oldest

[WinEventLog://Security]
disabled = 0
index = WINDOWS
start_from = oldest

######## Separate to send USB bus traffic ##########

[WinEventLog://Security]
disabled = 0
index = USB
start_from = oldest
whitelist = 1234,4321,5467, etc

[WinEventLog:/Microsoft-Windows-DriverFrameworks-UserMode/Operational]
disabled = 0
index = USB
start_from = oldest
interval = 1000,1001,1002,1003

 

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

The current approach won't work because Splunk combines the settings for each stanza name.  In the example, all WinEventLog:Security data will go to the USB index because it is specified last.

The better method is to not even try to separate the data by index.  Like data should be in the same index and separated at search time.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

The current approach won't work because Splunk combines the settings for each stanza name.  In the example, all WinEventLog:Security data will go to the USB index because it is specified last.

The better method is to not even try to separate the data by index.  Like data should be in the same index and separated at search time.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Leveraging Detections from the Splunk Threat Research Team & Cisco Talos

  Now On Demand  Stay ahead of today’s evolving threats with the combined power of the Splunk Threat Research ...

New in Splunk Observability Cloud: Automated Archiving for Unused Metrics

Automated Archival is a new capability within Metrics Management; which is a robust usage & cost optimization ...

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...