Splunk Search

Add original host to windows security event syslog header

agarrison
Path Finder

I want to export windows security events to syslog.
The following works but it shows the events all originate from splunk.
I want to replace the syslog header with the original host or at least tag the original host on the event.

Props.conf
[WinEventLog:Security]
TRANSFORMS-routing = ms_strm_dev

Outputs.conf
[syslog:ms_strm_dev]
server = 10.4.4.200:12468
type=tcp

Transforms.conf
[win_strm]
REGEX = (?msi)Security
DEST_KEY = _SYSLOG_ROUTING
FORMAT = ms_strm_dev

It looks like I could add something like this to my transforms, but how would I format the transform twice?
DEST_KEY = MetaData:Host
REGEX = (.+)
FORMAT = host::$1

0 Karma

sbbadri
Motivator
0 Karma

agarrison
Path Finder

I want to be about to filter AND route, this shows how to do either, but doesn't look like both to the same data. Unless I can route it to one transform, then back through another once it goes through the first.

0 Karma
Get Updates on the Splunk Community!

Demo Day: Strengthen Your SOC with Splunk Enterprise Security 8.1

Today’s threat landscape is more complex than ever. Security operation centers (SOCs) are overwhelmed with ...

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...