-
Notifications
You must be signed in to change notification settings - Fork 233
Add windows event id filtering to CWAgent #1737
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
b758b9e
to
516df4e
Compare
516df4e
to
2276ab2
Compare
plugins/inputs/windows_event_log/wineventlog/wineventlog_test.go
Outdated
Show resolved
Hide resolved
translator/translate/logs/logs_collected/windows_events/collect_list/collectlist.go
Show resolved
Hide resolved
translator/translate/logs/logs_collected/windows_events/collect_list/collectlist.go
Outdated
Show resolved
Hide resolved
translator/translate/logs/logs_collected/windows_events/collect_list/collectlist_test.go
Outdated
Show resolved
Hide resolved
translator/translate/logs/logs_collected/windows_events/collect_list/collectlist_test.go
Outdated
Show resolved
Hide resolved
9d99660
to
2667175
Compare
translator/translate/logs/logs_collected/windows_events/collect_list/collectlist.go
Show resolved
Hide resolved
translator/translate/logs/logs_collected/windows_events/collect_list/collectlist.go
Outdated
Show resolved
Hide resolved
translator/translate/logs/logs_collected/windows_events/windows_event_test.go
Outdated
Show resolved
Hide resolved
// Process value to ensure integers in arrays are preserved | ||
processedVal := processValue(val) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Interesting. There are some other integers that aren't mangled like log retention. I wonder why those work. Perhaps because they aren't in an array? We should understand why those integers don't require additional processing.
translator/translate/logs/logs_collected/windows_events/collect_list/collectlist.go
Show resolved
Hide resolved
ffba86e
to
a4bbe23
Compare
translator/translate/logs/logs_collected/windows_events/collect_list/collectlist.go
Outdated
Show resolved
Hide resolved
translator/translate/logs/logs_collected/windows_events/collect_list/ruleEventIDs.go
Outdated
Show resolved
Hide resolved
translator/translate/logs/logs_collected/windows_events/collect_list/ruleEventIDs.go
Show resolved
Hide resolved
translator/translate/logs/logs_collected/windows_events/collect_list/collectlist.go
Outdated
Show resolved
Hide resolved
097c665
to
dc6df12
Compare
translator/translate/logs/logs_collected/windows_events/collect_list/ruleEventIDs.go
Show resolved
Hide resolved
dc6df12
to
1ab8a1a
Compare
5c8f615
to
10f9f0a
Compare
5937d83
to
09f8320
Compare
b6989ca
to
99b2d63
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good!
Description of the issue
The CloudWatch Agent currently filters Windows Event Logs based on security levels (i.e Error, Critical, Information...). This does not allow customers to only collect specific and relevant logs to CloudWatch
Description of changes
sample configuration of event ID filtering
Caution
This PR has a testing PR linked to here: aws/amazon-cloudwatch-agent-test#541, merge this first.
License
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.
Tests
Integration test here: windows_event_id_test
Requirements
Before commiting your code, please do the following steps.
make fmt
andmake fmt-sh
make lint
Integration Tests
To run integration tests against this PR, add the
ready for testing
label.