Getting Data In

WinEventLog define sourcetype on forwarder

tprzelom
Path Finder

How do I change the sourcetype for events from Windows eventlog, it is usually WinEventLog:, where logname may be for example System or Application. In the following inputs.conf configuration
[WinEventLog:System]
sourcetype=win_clients
disabled = 0

the events arrive with a sourcetype of WinEventLog:System instead of win_clients.

0 Karma

Lowell
Super Champion

Try changing the source as well. It's possible that your events are matching a [source::WinEventLog:*](or similar) stanza in a props.conf file. Some of these contain TRANSFORMS entries that will automatically set (or in your case reset) the sourcetype. Other possibilities depend on your setup. For example, if your input is on a Universal Forwarder, then much of this will depend on the settings on your indexer (or whatever Splunk instances that is receiving the events) may be changing the sourcetype based on a configuration there.

If you could provide additional details about (1) the Splunk version you are running, (2) Which Windows apps (or TAs) you have installed, and (3) your environment (do you have forwarders, or are you on a single box, ...)

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...