Getting Data In

Is it possible to configure the universal forwarder to forward all Windows event logs without needing to put in every single log by hand?

kpers
Path Finder

For some time now I have been using Splunk to log all the basic Windows event logs such as App, Security, Setup, System, and Forwarded Events, but I cannot find a simple way to grab all the "Applications and Services Logs" since as far as I can tell, there is no way to use wildcards in the config to achieve this.

I personally do not want to hand type all the possible logs under this directory for each server and was hoping someone had a simple answer to this?

0 Karma

jkat54
SplunkTrust
SplunkTrust

As you've found there isnt a wildcard method. To make matters worse if you create custom windows event logs using your own applications, you have to add these to the windows event log viewer at least once, before you can consume them with Splunk. It has to do with some windows intricacies though and Splunk isn't to blame for that.

Another method is to write a script to dump the logs to file, but I would suggest many of the "Applications and Services Logs" that you have are A. Not enabled, B. Not useful to your end goal, and C. perhaps a waste of splunk licensing to index them.

0 Karma
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...