WELI Splunk (syslog / legacy) configuration

This article is meant as a companion to the main Windows Event Log Ingestion (WELI) article and gives configuration advice for using WELI with Splunk using a Splunk legacy text based Syslog option. Please read that article first and if you need to use the Splunk legacy text based syslog option, then follow the steps in this article. The other Splunk option using XML is the preferred method for integration if you can use it (reasons are in the main WELI article).

Configuration of your Vectra platform

Under Settings > External Connectors > Windows Event Log Ingestion use the following:

  • Type: Syslog

  • Data Format: tcp (cannot change)

  • Receiving port: 4638 (fixed)

  • Server IP/hostname: IP address where your Heavy Forwarder is installed

    • Test was done using a Splunk Heavy Forwarder in between the Indexer and Universal Forwarders.

    • If you do not have a Heavy Forwarder, the same configuration may work, but this was not tested and additional changes may be required for your environment.

  • Additional sources can be configure if desired.

Configuration of Splunk

We assume that you are already collecting Windows security event log data using Splunk Universal Forwarder(s) in this scenario and that you are using the Splunk legacy text based format and cannot use the XML option. In this scenario, we expect that log entries look similar to the following examples:

4768 Example:

4769 Example:

You will need to modify Splunk configuration files to enable a transformation of log data to a format that Vectra can parse:

The main idea is to duplicate the WinEventLog:Security to a new sourcetype, change the default routing to avoid sending it to Splunk indexers and send 4768 and 4769 events to Vectra Detect using ISC formated messages.

Modifying "outputs.conf":

Modifying "props.conf":

Modifying "transforms.conf":

To validate your configuration is working properly, follow the instructions titled "How can I validate successful parsing of WELI data?" in the main Windows Event Log Ingestion (WELI) article.

Last updated

Was this helpful?