Getting Data In

Is there a best practice guide for Splunk and Windows Event Collectors?

itrimble1
Path Finder

Does anyone have a guide for load balancing among Windows Event Collectors?

We have about 8 Windows Event Collector Servers.

We want to know if there is a best practice guide to get this set up correctly in Splunk, or any other SIEM.

We appear to be experiencing latency from the time the event is transmitted from the UF -----> HF.........>IDX.

0 Karma

itrimble1
Path Finder

I thought I'd answer this post, since I've learned a lot in between the original question and now. These resources really helped me out. I hope they can do the same for you.

Monitoring What Matters - Jessica Payne (Microsoft)
Peeping Through WIndows (Logs) - Hunting With Splunk - Part 5
Integrating Splunk with native Windows Event Collection - Great Webinar from Ultimate Windows Security
To XML or Classic Format - Conclusion is that XML collection is slower than classic rendering
Windows Event Forwarding Guidance - Guide to help setting up central Windows Logging through a collector
Project Sauron - Centralized Storage of Windows Events (Microsoft)
Create and Manage Subscriptions with PowerShell
Best Practice for Configuring EventLog Forwarding - specifically Server 2012R2, Server 2016
Blacklists and Whitelist Tuning - Hurricane Labs - Great guide to save on licensing

0 Karma
Get Updates on the Splunk Community!

New This Month in Splunk Observability Cloud - Metrics Usage Analytics, Enhanced K8s ...

The latest enhancements across the Splunk Observability portfolio deliver greater flexibility, better data and ...

Alerting Best Practices: How to Create Good Detectors

At their best, detectors and the alerts they trigger notify teams when applications aren’t performing as ...

Discover Powerful New Features in Splunk Cloud Platform: Enhanced Analytics, ...

Hey Splunky people! We are excited to share the latest updates in Splunk Cloud Platform 9.3.2408. In this ...