Splunk Search

Send Windows Logs to thrid party without Splunk adding in new syslog header

jmcclure
Explorer

I can send a subset of windows data as syslog server by sourcetype and then use the TransFroms to REGEX out the host.

None of this works though if Splunk puts a timestamp server header on each syslog message.

I have tried the

syslogSourceType = sourcetype::WinEventLog:Security, but this doesn't work.

Am I missing anything?

Tags (1)
0 Karma

davpx
Communicator
0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...