Hi All,
We have request from a Cybersecurity team to monitor the Windows Event Viewer logs in Splunk, my question is how to configure the monitoring stanza to get the event data into splunk.
Event Viewer (Local) --->Application and Services Logs --> OpenSSH --> Admin
Event Viewer (Local) --->Application and Services Logs --> OpenSSH --> Operational
When I check the properties to find the exact Log Path details I could see like this
%SystemRoot%\System32\Winevt\Logs\OpenSSH%4Operational.evtx
%SystemRoot%\System32\Winevt\Logs\OpenSSH%4Admin.evtx
My question is how to write the monitoring stanza for this path and define the sourcetype for the same.
[WinEventLog://Application/OpenSSH/Operational]
sourcetype=winEventLog:OpenSSH:Operational
index=test
disable=0
[WinEventLog://Applicaion/OpenSSH/Adminl]
sourcetype=winEventLog:OpenSSH:Admin
index=test
disable=0
Please guide me on this
@Hemnaath - Please try below two stanzas.
[WinEventLog://OpenSSH/Operational]
sourcetype=winEventLog:OpenSSH:Operational
index=test
disable=0
[WinEventLog://OpenSSH/Admin]
sourcetype=winEventLog:OpenSSH:Admin
index=test
disable=0
Please read the reference here - https://docs.splunk.com/Documentation/Splunk/8.2.6/Data/MonitorWindowseventlogdata
I hope this helps!!! Upvote/karma would be appreciated!!!
Hey I had deployed the below stanza to the remote machine to monitor the windows Event View --> OpenSSH But unable to see the data being monitored from the machine.
Monitoring stanza details:
[WinEventLog://OpenSSH/Operational]
index=main
sourcetype=winEventLog
start_from = oldest
current_only = 0
checkpointInterval = 5
disable=0
renderXml=false
[WinEventLog://OpenSSH/Admin]
index=main
sourcetype=winEventLog
current_only = 0
checkpointInterval = 5
disable=0
renderXml=false
I tried to check the Splunk internal logs but unable to get any thing related to this sourcetype.
index="_internal" sourcetype=splunkd* host="XXXXX*" channel='OpenSSH/Admin'
Can any one guide me how to monitor the Windows Event Viewer
@Hemnaath - Can you please try to see any error with the below query?
index="_internal" sourcetype=splunkd host="XXXXX*" CASE(ERROR)
executed the query but there were no error/warn related to the source OpenSSH, could see below error for other channel.
05-12-2022 12:04:31.538 +0000 ERROR ExecProcessor - message from ""C:\Program Files\SplunkUniversalForwarder\bin\splunk-winevtlog.exe"" ERROR splunk-winevtlog - WinEventLogChannel::saveBookMark: Failed to update Windows Event Log bookmark, channel='System'