Monitoring Splunk

Monitoring EVTX file on different partition provides garbled data

bobmc859
New Member

I've moved the Windows Event log Forwarded Events log to another partition because I expect it to out grow the C partition on our W2K16 machine. In my input conf, before I moved the log I had it set to the following:

[WinEventLog://ForwardedEvents]
disabled = 0
index = wineventlog

Which seem to work fine, however after moving the evtx file I set up the following in my input conf file and it doesn't seem to work as expected

[monitor://E:\ForwardedEventsLogs\ForwardedEvents.evtx]
sourcetype=WinEventLog:ForwardedEvents
index = wineventlog
disabled = 0

What I get is garbage like this:
ElfFile\x00\x00\x00\x00\x00\x00\x00\x00\x00@!\x00\x00\x00\x00\x00ԏ\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00

Any suggestions on what I'm doing wrong?

Thanks!

Tags (1)
0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...