Splunk Search

Send Windows Logs to thrid party without Splunk adding in new syslog header

jmcclure
Explorer

I can send a subset of windows data as syslog server by sourcetype and then use the TransFroms to REGEX out the host.

None of this works though if Splunk puts a timestamp server header on each syslog message.

I have tried the

syslogSourceType = sourcetype::WinEventLog:Security, but this doesn't work.

Am I missing anything?

Tags (1)
0 Karma

davpx
Communicator
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...