Windows Event Log
This module allows CrowdSec
to acquire logs from the Windows Event Log.
#
Configuration exampleTo monitor all events with the ID 4625, from the Security
channel (ie, authentication failed):
source: wineventlogevent_channel: Securityevent_ids: - 4625event_level: informationlabels: type: eventlog
You can also write a custom XPath query:
source: wineventlogxpath_query: | <QueryList><Query><Select Path=\"Security\">*[System[(EventID=42) and (Level=2)]]</Select></Query></QueryList>labels: type: eventlog
#
Parametersevent_channel
#
The name of the channel to read events from.
Must be set if xpath_query
is not set.
event_level
#
The log level of the events to read.
Must be one of VERBOSE
, INFORMATION
, WARNING
, ERROR
or CRITICAL
.
Only used if event_channel
is specified.
event_ids
#
List of event IDs you want to match.
Only used if event_channel
is specified.
xpath_query
#
A custom XPath query to read events.
Must be set if event_channel
is not set.
You can refer to the Windows documentation for more informations: https://docs.microsoft.com/en-us/windows/win32/wes/consuming-events
pretty_name
#
Pretty name to use for the datasource in the metrics (cscli metrics
).
This parameter is optional, but strongly recommanded, as by default the full xpath query will be displayed in the metrics, which can be hard to read.