My recommendation is create a series of DS apps that contain the inputs, usually one for each event log branch you want to collect, something like:
DS-all_departments-Inputs-wineventlog_security
DS-all_departments-Inputs-wineventlog_system
DS-all_departments-Inputs-wineventlog_application
Then, in your serverclass.conf, you can mix and match as needed:
# get the windows security logs from all windows systems
[serverClass:WinSecurity]
whitelist.0=*
machineTypesFilter=windows-*
[serverClass:WinSecurity:app:DS-all_departments-Inputs-wineventlog_security]
[serverClass:WinApplication]
whitelist.0=prod.yourcompany.com
[serverClass:WinApplication:app:DS-all_departments-Inputs-wineventlog_application]
# note that we don't have to add the winsecurity logs,
# as they are already in another class which includes all windows systesm
[serverClass:WinTheWorks]
whitelist .0 = appservers.yourcompany.com
[serverClass:WinTheWorks:app:DS-all_departments-Inputs-wineventlog_application]
[serverClass:WinTheWorks:app:DS-all_departments-Inputs-wineventlog_system]
You can then distribute the Splunk_TA_windows to your indexers and search heads only, not all of your enterprise. But, you can use the inputs.conf from the TA as the base for your input apps.
... View more