We are monitoring for specific Windows events on our Domain Controllers.
Inputs.conf looks like this:
[WinEventLog://Security]
disabled = 0
index = winevents
start_from = oldest
current_only = 0
checkpointInterval = 5
whitelist = 4728,4729,4732,4733,4756,4757,4755
Whe I add a test user to a universal security group, I trigger an event in the security log:
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 8/11/2016 3:22:50 PM
Event ID: 4756
Task Category: Security Group Management
Level: Information
Keywords: Audit Success
User: N/A
Computer: xxxxxxxxxxxx
Description:
A member was added to a security-enabled universal group.
Subject:
Security ID: LONDON\xxxxxxxxxxxx
Account Name: xxxxxxx
Account Domain: LONDON
Logon ID: 0x86xxxx
Member:
Security ID: LONDON\splunk_test
Account Name: CN=Splunk Test Log Generator UK,OU=xxx,OU=Test Area,OU=xxx,OU=OIAL,DC=xxx,DC=xxx,DC=xxx
Group:
Security ID: LONDON\xxxxxx
Account Name: xxxxxxxxxxxx
Account Domain: LONDON
Additional Information:
Privileges: -
Event Xml:
Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
EventID>**4756**
etc etc
But this event never makes it into the index.
No errors on the splunkd log.
What am i missing?
That seems to look right. What version of Splunk? Do you get any events from the dc in Splunk (internal events included)? Any other events from the event log on that dc? Any event log events from any forwarders? Where is your inputs.conf located?