Getting Data In

Universal forwarder configured to collect application event logs

aimeedillon13
Engager

Trying to collect specific GPO event codes so we've created an app on the universal forwarder with the below in the inputs.conf file:

[WinEventLog://Application]
disabled = 0
current_only = 1
evt_resolve_ad_obj = 1
checkpointInterval = 300
whitelist = 5126,5257,5312,5313,1069,1128,4098
blacklist1 = EventCode="4662" Message="Object Type:\s+(?!groupPolicyContainer)"
blacklist2 = EventCode="566" Message="Object Type:\s+(?!groupPolicyContainer)"
index = wineventlog
renderXml=false

I can see the event logs on the server but can't see any in splunk. The wineventlog index already exists.

0 Karma
1 Solution

aimeedillon13
Engager

By changing the first line to the below I got what I was after:

[WinEventLog://Microsoft-Windows-GroupPolicy/Operational]

View solution in original post

0 Karma

aimeedillon13
Engager

By changing the first line to the below I got what I was after:

[WinEventLog://Microsoft-Windows-GroupPolicy/Operational]

0 Karma

richgalloway
SplunkTrust
SplunkTrust

@aimeedillon13, If your problem is resolved, please accept the answer to help future readers.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...