This widget could not be displayed.
This widget could not be displayed.
Getting Data In

Windows Event Logs and Non Standard Importing

smvalois
Explorer

Morning,

We run AD in our environment and the Windows server team does not wish to allow for the use of WMI calls and a service account. They already have a tool called "Event Reporter" which will package windows logs and send them Syslog. Do you know of a way to parse Non standard Windows logs? I either have to figure this out, or remap all the fields by hand using the built in field extractor.

Thank you

Tags (2)
This widget could not be displayed.
0 Karma
This widget could not be displayed.
Reply

mazurmateusz
Engager

follow up. How you solve your problem?

This widget could not be displayed.
0 Karma
This widget could not be displayed.
This widget could not be displayed.
Reply

ltrand
Contributor

You can use the props & transforms.conf files to dictate how to parse this automatically.

http://wiki.splunk.com/Where_do_I_configure_my_Splunk_settings%3F

This widget could not be displayed.
0 Karma
This widget could not be displayed.
This widget could not be displayed.
Reply

smvalois
Explorer

I know that you can over ride parsers in other products like LogRhyhtm and ArcSight, I am mostly looking to see if i can force a parse on a source, if I know the data type.

This widget could not be displayed.
0 Karma
This widget could not be displayed.
This widget could not be displayed.
Reply
This widget could not be displayed.
This widget could not be displayed.
This widget could not be displayed.
This widget could not be displayed.
This widget could not be displayed.
This widget could not be displayed.
Get Updates on the Splunk Community!