Getting Data In

Universal forwarder configured to collect application event logs

aimeedillon13
Engager

Trying to collect specific GPO event codes so we've created an app on the universal forwarder with the below in the inputs.conf file:

[WinEventLog://Application]
disabled = 0
current_only = 1
evt_resolve_ad_obj = 1
checkpointInterval = 300
whitelist = 5126,5257,5312,5313,1069,1128,4098
blacklist1 = EventCode="4662" Message="Object Type:\s+(?!groupPolicyContainer)"
blacklist2 = EventCode="566" Message="Object Type:\s+(?!groupPolicyContainer)"
index = wineventlog
renderXml=false

I can see the event logs on the server but can't see any in splunk. The wineventlog index already exists.

0 Karma
1 Solution

aimeedillon13
Engager

By changing the first line to the below I got what I was after:

[WinEventLog://Microsoft-Windows-GroupPolicy/Operational]

View solution in original post

0 Karma

aimeedillon13
Engager

By changing the first line to the below I got what I was after:

[WinEventLog://Microsoft-Windows-GroupPolicy/Operational]

0 Karma

richgalloway
SplunkTrust
SplunkTrust

@aimeedillon13, If your problem is resolved, please accept the answer to help future readers.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

SOC4Kafka - New Kafka Connector Powered by OpenTelemetry

The new SOC4Kafka connector, built on OpenTelemetry, enables the collection of Kafka messages and forwards ...

Your Voice Matters! Help Us Shape the New Splunk Lantern Experience

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Building Momentum: Splunk Developer Program at .conf25

At Splunk, developers are at the heart of innovation. That’s why this year at .conf25, we officially launched ...