The Splunk Add-on for PowerShell provides field extraction for PowerShell event
logs. Unfortunately, PowerShell logs are in system language which requires field
extraction for each language. Furthermore, delimiters are sometimes :
and sometimes =
.
Currently supported languages are
- English
- French
- Italian
- German
Collection of Microsoft-Windows-PowerShell/Operational
event logs.
Add the folder "ta-microsoft-powershell" to a ZIP and upload it to https://spunkserver/en-US/manager/appinstall/_upload.
Following source is used for field extraction.
source="XmlWinEventLog:Microsoft-Windows-PowerShell/Operational"
File an issue or submit a pull request.