Hi,
How we can distinguish windows/linux logs from the AWS logs. Is there any TA/App is available which support by splunk?
Same query for AZURE & GCP(Goole Cloud Platform)?
Windows logs have a different sourcetype from Linux.
If you install both the Windows and Linux TA on the machines it will put the data into the appropriate sourcetypes for you.
If however you are talking about EC2 cloud trail/cloud watch etc, you will need to look at the data carefully, because when ec2 reports metrics it has no concept of the instance OS.
See the following Apps for more info:
Windows/Linux
https://splunkbase.splunk.com/app/742/
https://splunkbase.splunk.com/app/833/
AWS:
https://splunkbase.splunk.com/app/1876/
https://splunkbase.splunk.com/app/1274/
Azure/GCP:
https://splunkbase.splunk.com/app/3110/
https://splunkbase.splunk.com/app/3088/
Windows logs have a different sourcetype from Linux.
If you install both the Windows and Linux TA on the machines it will put the data into the appropriate sourcetypes for you.
If however you are talking about EC2 cloud trail/cloud watch etc, you will need to look at the data carefully, because when ec2 reports metrics it has no concept of the instance OS.
See the following Apps for more info:
Windows/Linux
https://splunkbase.splunk.com/app/742/
https://splunkbase.splunk.com/app/833/
AWS:
https://splunkbase.splunk.com/app/1876/
https://splunkbase.splunk.com/app/1274/
Azure/GCP:
https://splunkbase.splunk.com/app/3110/
https://splunkbase.splunk.com/app/3088/
Thanks for the clarification about cloudtrail/cloudwatch logs.
In cloudwatch logs suppose I am getting failed login events which same as windows logs (event id 4625). So it should be parsed as a windows parsing?
If yes then it would be done by AWS splunk app?