<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic [HELP] No events from remote FileServer - SECURITY log in Security</title>
    <link>https://community.splunk.com/t5/Security/HELP-No-events-from-remote-FileServer-SECURITY-log/m-p/242477#M14888</link>
    <description>&lt;P&gt;I can't seem to get this figured out. I've tried adding the stanzas to the output.conf file on my fileserver where the SplunkUniversalForwarder is installed, but nothing from the security log ever shows up. Here's the end of my splunkd log.&lt;/P&gt;

&lt;P&gt;Windows Server 2012 R2 for both the Indexer and FileServer I'm attempting to pull logs from.&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;03-15-2016 12:54:54.552 -0700 ERROR ExecProcessor - message from ""C:\Program Files\SplunkUniversalForwarder\bin\splunk-&amp;gt;admon.exe"" splunk-admon - ADMonitorThread::launchADMonitor: Failed to initialize ADMonitor='admon://NearestDC', targedDC='(null)'&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;ad nauseum. &lt;/P&gt;

&lt;P&gt;Here is my inputs.conf (copied to /etc/var/system/local) --&lt;/P&gt;

&lt;H1&gt;Version 6.3.3&lt;/H1&gt;

&lt;H1&gt;DO NOT EDIT THIS FILE!&lt;/H1&gt;

&lt;H1&gt;Changes to default files will be lost on update and are difficult to&lt;/H1&gt;

&lt;H1&gt;manage and support.&lt;/H1&gt;

&lt;H1&gt;Please make any changes to system defaults by overriding them in&lt;/H1&gt;

&lt;H1&gt;apps or $SPLUNK_HOME/etc/system/local&lt;/H1&gt;

&lt;H1&gt;(See "Configuration file precedence" in the web documentation).&lt;/H1&gt;

&lt;H1&gt;To override a specific setting, copy the name of the stanza and&lt;/H1&gt;

&lt;H1&gt;setting to the file where you wish to override it.&lt;/H1&gt;

&lt;H1&gt;This file contains possible attributes and values you can use to&lt;/H1&gt;

&lt;H1&gt;configure inputs, distributed inputs and file system monitoring.&lt;/H1&gt;

&lt;P&gt;[default]&lt;BR /&gt;
index         = default&lt;BR /&gt;
_rcvbuf        = 1572864&lt;BR /&gt;
host = $decideOnStartup&lt;BR /&gt;
evt_resolve_ad_obj = 0&lt;BR /&gt;
evt_dc_name=&lt;BR /&gt;
evt_dns_name=&lt;/P&gt;

&lt;P&gt;[blacklist:$SPLUNK_HOME\etc\auth]&lt;/P&gt;

&lt;P&gt;[monitor://$SPLUNK_HOME\var\log\splunk]&lt;BR /&gt;
index = _internal&lt;/P&gt;

&lt;P&gt;[monitor://$SPLUNK_HOME\etc\splunk.version]&lt;BR /&gt;
_TCP_ROUTING = *&lt;BR /&gt;
index = _internal&lt;BR /&gt;
sourcetype=splunk_version&lt;/P&gt;

&lt;P&gt;[batch://$SPLUNK_HOME\var\spool\splunk]&lt;BR /&gt;
move_policy = sinkhole&lt;BR /&gt;
crcSalt = &lt;/P&gt;

&lt;P&gt;[batch://$SPLUNK_HOME\var\spool\splunk...stash_new]&lt;BR /&gt;
queue       = stashparsing&lt;BR /&gt;
sourcetype  = stash_new&lt;BR /&gt;
move_policy = sinkhole&lt;BR /&gt;
crcSalt     = &lt;/P&gt;

&lt;P&gt;[fschange:$SPLUNK_HOME\etc]&lt;/P&gt;

&lt;H1&gt;poll every 10 minutes&lt;/H1&gt;

&lt;P&gt;pollPeriod = 600&lt;/P&gt;

&lt;H1&gt;generate audit events into the audit index, instead of fschange events&lt;/H1&gt;

&lt;P&gt;signedaudit=true&lt;BR /&gt;
recurse=true&lt;BR /&gt;
followLinks=false&lt;BR /&gt;
hashMaxSize=-1&lt;BR /&gt;
fullEvent=false&lt;BR /&gt;
sendEventMaxSize=-1&lt;BR /&gt;
filesPerDelay = 10&lt;BR /&gt;
delayInMills = 100&lt;/P&gt;

&lt;P&gt;[udp]&lt;BR /&gt;
connection_host=ip&lt;/P&gt;

&lt;P&gt;[tcp]&lt;BR /&gt;
acceptFrom=*&lt;BR /&gt;
connection_host=dns&lt;/P&gt;

&lt;P&gt;[splunktcp]&lt;BR /&gt;
route=has_key:_replicationBucketUUID:replicationQueue;has_key:_dstrx:typingQueue;has_key:_linebreaker:indexQueue;absent_key:_linebreaker:parsingQueue&lt;BR /&gt;
acceptFrom=*&lt;BR /&gt;
connection_host=ip&lt;/P&gt;

&lt;P&gt;[script]&lt;BR /&gt;
interval = 60.0&lt;BR /&gt;
start_by_shell = false&lt;/P&gt;

&lt;P&gt;[SSL]&lt;/P&gt;

&lt;H1&gt;default cipher suites that splunk allows. Change this if you wish to increase the security&lt;/H1&gt;

&lt;H1&gt;of SSL connections, or to lower it if you having trouble connecting to splunk.&lt;/H1&gt;

&lt;P&gt;cipherSuite = ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM&lt;BR /&gt;
allowSslRenegotiation = true&lt;BR /&gt;
sslQuietShutdown = false&lt;/P&gt;

&lt;H1&gt;Allow only sslv3 and above connections&lt;/H1&gt;

&lt;P&gt;sslVersions = *,-ssl2&lt;/P&gt;

&lt;P&gt;[script://$SPLUNK_HOME\bin\scripts\splunk-wmi.path]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
interval = 10000000&lt;BR /&gt;
source = wmi&lt;BR /&gt;
sourcetype = wmi&lt;BR /&gt;
queue = winparsing&lt;BR /&gt;
persistentQueueSize=200MB&lt;/P&gt;

&lt;H1&gt;default single instance modular input restarts&lt;/H1&gt;

&lt;H1&gt;Windows platform specific input processor.&lt;/H1&gt;

&lt;P&gt;[WinEventLog://Application]&lt;BR /&gt;
disabled = 0 &lt;BR /&gt;
[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
start_from = oldest&lt;BR /&gt;
current_only = 0&lt;BR /&gt;
evt_resolve_ad_obj = 1&lt;BR /&gt;
checkpointInterval = 5&lt;/P&gt;

&lt;H1&gt;only index events with these event IDs.&lt;/H1&gt;

&lt;P&gt;whitelist = 0-2000,3001-10000&lt;/P&gt;

&lt;H1&gt;exclude these event IDs from being indexed.&lt;/H1&gt;

&lt;P&gt;blacklist = 2001-3000[WinEventLog://System]&lt;BR /&gt;
disabled = 0"&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 09:03:28 GMT</pubDate>
    <dc:creator>akmartin</dc:creator>
    <dc:date>2020-09-29T09:03:28Z</dc:date>
    <item>
      <title>[HELP] No events from remote FileServer - SECURITY log</title>
      <link>https://community.splunk.com/t5/Security/HELP-No-events-from-remote-FileServer-SECURITY-log/m-p/242477#M14888</link>
      <description>&lt;P&gt;I can't seem to get this figured out. I've tried adding the stanzas to the output.conf file on my fileserver where the SplunkUniversalForwarder is installed, but nothing from the security log ever shows up. Here's the end of my splunkd log.&lt;/P&gt;

&lt;P&gt;Windows Server 2012 R2 for both the Indexer and FileServer I'm attempting to pull logs from.&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;03-15-2016 12:54:54.552 -0700 ERROR ExecProcessor - message from ""C:\Program Files\SplunkUniversalForwarder\bin\splunk-&amp;gt;admon.exe"" splunk-admon - ADMonitorThread::launchADMonitor: Failed to initialize ADMonitor='admon://NearestDC', targedDC='(null)'&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;ad nauseum. &lt;/P&gt;

&lt;P&gt;Here is my inputs.conf (copied to /etc/var/system/local) --&lt;/P&gt;

&lt;H1&gt;Version 6.3.3&lt;/H1&gt;

&lt;H1&gt;DO NOT EDIT THIS FILE!&lt;/H1&gt;

&lt;H1&gt;Changes to default files will be lost on update and are difficult to&lt;/H1&gt;

&lt;H1&gt;manage and support.&lt;/H1&gt;

&lt;H1&gt;Please make any changes to system defaults by overriding them in&lt;/H1&gt;

&lt;H1&gt;apps or $SPLUNK_HOME/etc/system/local&lt;/H1&gt;

&lt;H1&gt;(See "Configuration file precedence" in the web documentation).&lt;/H1&gt;

&lt;H1&gt;To override a specific setting, copy the name of the stanza and&lt;/H1&gt;

&lt;H1&gt;setting to the file where you wish to override it.&lt;/H1&gt;

&lt;H1&gt;This file contains possible attributes and values you can use to&lt;/H1&gt;

&lt;H1&gt;configure inputs, distributed inputs and file system monitoring.&lt;/H1&gt;

&lt;P&gt;[default]&lt;BR /&gt;
index         = default&lt;BR /&gt;
_rcvbuf        = 1572864&lt;BR /&gt;
host = $decideOnStartup&lt;BR /&gt;
evt_resolve_ad_obj = 0&lt;BR /&gt;
evt_dc_name=&lt;BR /&gt;
evt_dns_name=&lt;/P&gt;

&lt;P&gt;[blacklist:$SPLUNK_HOME\etc\auth]&lt;/P&gt;

&lt;P&gt;[monitor://$SPLUNK_HOME\var\log\splunk]&lt;BR /&gt;
index = _internal&lt;/P&gt;

&lt;P&gt;[monitor://$SPLUNK_HOME\etc\splunk.version]&lt;BR /&gt;
_TCP_ROUTING = *&lt;BR /&gt;
index = _internal&lt;BR /&gt;
sourcetype=splunk_version&lt;/P&gt;

&lt;P&gt;[batch://$SPLUNK_HOME\var\spool\splunk]&lt;BR /&gt;
move_policy = sinkhole&lt;BR /&gt;
crcSalt = &lt;/P&gt;

&lt;P&gt;[batch://$SPLUNK_HOME\var\spool\splunk...stash_new]&lt;BR /&gt;
queue       = stashparsing&lt;BR /&gt;
sourcetype  = stash_new&lt;BR /&gt;
move_policy = sinkhole&lt;BR /&gt;
crcSalt     = &lt;/P&gt;

&lt;P&gt;[fschange:$SPLUNK_HOME\etc]&lt;/P&gt;

&lt;H1&gt;poll every 10 minutes&lt;/H1&gt;

&lt;P&gt;pollPeriod = 600&lt;/P&gt;

&lt;H1&gt;generate audit events into the audit index, instead of fschange events&lt;/H1&gt;

&lt;P&gt;signedaudit=true&lt;BR /&gt;
recurse=true&lt;BR /&gt;
followLinks=false&lt;BR /&gt;
hashMaxSize=-1&lt;BR /&gt;
fullEvent=false&lt;BR /&gt;
sendEventMaxSize=-1&lt;BR /&gt;
filesPerDelay = 10&lt;BR /&gt;
delayInMills = 100&lt;/P&gt;

&lt;P&gt;[udp]&lt;BR /&gt;
connection_host=ip&lt;/P&gt;

&lt;P&gt;[tcp]&lt;BR /&gt;
acceptFrom=*&lt;BR /&gt;
connection_host=dns&lt;/P&gt;

&lt;P&gt;[splunktcp]&lt;BR /&gt;
route=has_key:_replicationBucketUUID:replicationQueue;has_key:_dstrx:typingQueue;has_key:_linebreaker:indexQueue;absent_key:_linebreaker:parsingQueue&lt;BR /&gt;
acceptFrom=*&lt;BR /&gt;
connection_host=ip&lt;/P&gt;

&lt;P&gt;[script]&lt;BR /&gt;
interval = 60.0&lt;BR /&gt;
start_by_shell = false&lt;/P&gt;

&lt;P&gt;[SSL]&lt;/P&gt;

&lt;H1&gt;default cipher suites that splunk allows. Change this if you wish to increase the security&lt;/H1&gt;

&lt;H1&gt;of SSL connections, or to lower it if you having trouble connecting to splunk.&lt;/H1&gt;

&lt;P&gt;cipherSuite = ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM&lt;BR /&gt;
allowSslRenegotiation = true&lt;BR /&gt;
sslQuietShutdown = false&lt;/P&gt;

&lt;H1&gt;Allow only sslv3 and above connections&lt;/H1&gt;

&lt;P&gt;sslVersions = *,-ssl2&lt;/P&gt;

&lt;P&gt;[script://$SPLUNK_HOME\bin\scripts\splunk-wmi.path]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
interval = 10000000&lt;BR /&gt;
source = wmi&lt;BR /&gt;
sourcetype = wmi&lt;BR /&gt;
queue = winparsing&lt;BR /&gt;
persistentQueueSize=200MB&lt;/P&gt;

&lt;H1&gt;default single instance modular input restarts&lt;/H1&gt;

&lt;H1&gt;Windows platform specific input processor.&lt;/H1&gt;

&lt;P&gt;[WinEventLog://Application]&lt;BR /&gt;
disabled = 0 &lt;BR /&gt;
[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
start_from = oldest&lt;BR /&gt;
current_only = 0&lt;BR /&gt;
evt_resolve_ad_obj = 1&lt;BR /&gt;
checkpointInterval = 5&lt;/P&gt;

&lt;H1&gt;only index events with these event IDs.&lt;/H1&gt;

&lt;P&gt;whitelist = 0-2000,3001-10000&lt;/P&gt;

&lt;H1&gt;exclude these event IDs from being indexed.&lt;/H1&gt;

&lt;P&gt;blacklist = 2001-3000[WinEventLog://System]&lt;BR /&gt;
disabled = 0"&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:03:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/HELP-No-events-from-remote-FileServer-SECURITY-log/m-p/242477#M14888</guid>
      <dc:creator>akmartin</dc:creator>
      <dc:date>2020-09-29T09:03:28Z</dc:date>
    </item>
    <item>
      <title>Re: [HELP] No events from remote FileServer - SECURITY log</title>
      <link>https://community.splunk.com/t5/Security/HELP-No-events-from-remote-FileServer-SECURITY-log/m-p/242478#M14889</link>
      <description>&lt;P&gt;I have a similar problem, it seems the problem is with the TA-DomainController-NT6 app or the Splunk_TA_windows app you may have installed. The specific line with causing this problem is:&lt;/P&gt;

&lt;P&gt;[admon://NearestDC]&lt;BR /&gt;
monitorSubtree = 1&lt;BR /&gt;
interval=3600&lt;BR /&gt;
disabled=true&lt;BR /&gt;
index=msad&lt;/P&gt;

&lt;P&gt;If you do not need to use it, you can disable it and the errors will stop.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:12:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/HELP-No-events-from-remote-FileServer-SECURITY-log/m-p/242478#M14889</guid>
      <dc:creator>djfangGR</dc:creator>
      <dc:date>2020-09-29T09:12:58Z</dc:date>
    </item>
    <item>
      <title>Re: [HELP] No events from remote FileServer - SECURITY log</title>
      <link>https://community.splunk.com/t5/Security/HELP-No-events-from-remote-FileServer-SECURITY-log/m-p/242479#M14890</link>
      <description>&lt;P&gt;I started all over and just removed everything. Cleared all the logs and reconnected the UF. Once I did that everything started showing up properly, no more errors. I did so much tinkering I think I just messed things up.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Mar 2016 18:00:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/HELP-No-events-from-remote-FileServer-SECURITY-log/m-p/242479#M14890</guid>
      <dc:creator>akmartin</dc:creator>
      <dc:date>2016-03-28T18:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: [HELP] No events from remote FileServer - SECURITY log</title>
      <link>https://community.splunk.com/t5/Security/HELP-No-events-from-remote-FileServer-SECURITY-log/m-p/242480#M14891</link>
      <description>&lt;P&gt;Thanks for this&lt;/P&gt;</description>
      <pubDate>Wed, 11 Apr 2018 17:30:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/HELP-No-events-from-remote-FileServer-SECURITY-log/m-p/242480#M14891</guid>
      <dc:creator>oobijiaku</dc:creator>
      <dc:date>2018-04-11T17:30:28Z</dc:date>
    </item>
  </channel>
</rss>

