Getting Data In

Universal forwarder configured to collect application event logs

aimeedillon13
Engager

Trying to collect specific GPO event codes so we've created an app on the universal forwarder with the below in the inputs.conf file:

[WinEventLog://Application]
disabled = 0
current_only = 1
evt_resolve_ad_obj = 1
checkpointInterval = 300
whitelist = 5126,5257,5312,5313,1069,1128,4098
blacklist1 = EventCode="4662" Message="Object Type:\s+(?!groupPolicyContainer)"
blacklist2 = EventCode="566" Message="Object Type:\s+(?!groupPolicyContainer)"
index = wineventlog
renderXml=false

I can see the event logs on the server but can't see any in splunk. The wineventlog index already exists.

0 Karma
1 Solution

aimeedillon13
Engager

By changing the first line to the below I got what I was after:

[WinEventLog://Microsoft-Windows-GroupPolicy/Operational]

View solution in original post

0 Karma

aimeedillon13
Engager

By changing the first line to the below I got what I was after:

[WinEventLog://Microsoft-Windows-GroupPolicy/Operational]

0 Karma

richgalloway
SplunkTrust
SplunkTrust

@aimeedillon13, If your problem is resolved, please accept the answer to help future readers.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.0.2 Availability: On cloud and On-premise!

A few months ago, we released Splunk Enterprise Security 8.0 for our cloud customers. Today, we are excited to ...

Logs to Metrics

Logs and Metrics Logs are generally unstructured text or structured events emitted by applications and written ...

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...