Getting Data In

WIndows Active Directory sourcetypes

Gene
Path Finder

Dear Splunkers, I have a question regarding AD data input. Can you please advise on what sourcetype and source of events is correct one?

I have installed UF and created input - data came from WinEventLog:Security source. Then I installed Addon for Microsoft and created blacklists in inputs.conf file and pushed it to UF. After that modification I receive events from XmlWinEventLog:SecurityI was trying to figure out which one is correct but had no luck to find clear answer.
My inputs.conf

[WinEventLog://Security]
disabled = 1
start_from = oldest
current_only = 1
evt_resolve_ad_obj = 1
checkpointInterval = 5

renderXml=true
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"
blacklist2 = EventCode="566" Message="Object Type:(?!\s*groupPolicyContainer)"

0 Karma
1 Solution

venkatasri
SplunkTrust
SplunkTrust

Hi @Gene 

Docs says, with renderXml=true option you would see xmlwineventlog sourcetype.  if you make it false the sourcetype would switch to classic mode.

Previous versions of the Splunk Add-on for Windows collected WinEventLog data collection inputs in Classic mode. By default, version 6.0.0 of the Splunk Add-on for Windows collects all WinEventLog data collection inputs in XML mode.

Refer - Upgrade the Splunk Add-on for Windows - Splunk Documentation having detailed info.

----

An upvote would be appreciated if it helps!

View solution in original post

venkatasri
SplunkTrust
SplunkTrust

Hi @Gene 

Docs says, with renderXml=true option you would see xmlwineventlog sourcetype.  if you make it false the sourcetype would switch to classic mode.

Previous versions of the Splunk Add-on for Windows collected WinEventLog data collection inputs in Classic mode. By default, version 6.0.0 of the Splunk Add-on for Windows collects all WinEventLog data collection inputs in XML mode.

Refer - Upgrade the Splunk Add-on for Windows - Splunk Documentation having detailed info.

----

An upvote would be appreciated if it helps!

Gene
Path Finder

Thanks. That's what I was looking for!

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

How to find the worst searches in your Splunk environment and how to fix them

Everyone knows Splunk is a powerful platform for running searches and doing data analytics. Your ...

Share Your Feedback: On Admin Config Service (ACS)!

Help Us Build a Better Admin Config Service Experience (ACS)   We Want Your Feedback on Admin Config Service ...