Is it possible to forward collected logs from a Windows Event Collector (WEC) server, i.e. from the Windows service that remotely collects logs from other windows servers, such that the logs are compatible with "Splunk App for Windows Infrastructure" ?
I imagaine that at a minimum this would require "transforming" the default fields of host, source, sourcetype to meaningful values rather than the values that WEC uses. Would this then allow the events to be processed by the "Splunk Add-On for Windows" ?
I know that the recommended method is to use a Universal Forwarder on all servers, or alternatively WMI, but as WEC has been around for a long time I am surprised there is no mention of it here ...
http://docs.splunk.com/Documentation/Splunk/6.6.0/Data/AboutWindowsdataandSplunk
Any information about anybody's experiences is much appreciated.
Hi,
Mikael
Hi,
Mikael
any other method to collect logs other than wec.
Thanks. Just what I was looking for.
Hi @mikaelbje, what would you recommend instead of using Windows Event Collectors? Is the alternative simply installing a universal forwarder on every endpoint?
@mikaelbje
I would also like to know what's recommended. Are people really installing Splunk Universal Forwarder on every endpoint? Thanks.
hello paxos,
I must ask, why not use the Universal Forwarder?
There are a couple of reasons I am trying to avoid that:
a) the logs are already collected (for another purpose) from the clients on a Windows Event Collector server using the inbuilt Windows Event Forwarding. Collecting them again using a Universal Forwarder would just be doubling the load on those clients and "duplicating" the traffic.
b) to avoid the administrative and cost overhead in organising the installation and update of the Forwarder in an environment managed by an outsourced provider.
What did you end up going with ?