<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic No data in app. in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156527#M14295</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;

&lt;P&gt;I've installed everything correctly and I have quite a lot of data being logged in splunk now (nearly 20GB per day). I can see when I search for one of the SQL servers in splunk as "host=servername" that it shows source = WinEventLog://Security and sourcetype = WinEventLog:Security so it's definitely logging data and indexing it in splunk.&lt;/P&gt;

&lt;P&gt;However, the Microsoft SQL Server App itself isn't showing any data.&lt;BR /&gt;
When I run all 5 lookup generators, they all show no results, despite me seeing data indexed in splunk for the SQl server.&lt;/P&gt;

&lt;P&gt;How can I get the app to find the data?&lt;/P&gt;</description>
    <pubDate>Wed, 19 Feb 2014 11:31:24 GMT</pubDate>
    <dc:creator>Lazarix</dc:creator>
    <dc:date>2014-02-19T11:31:24Z</dc:date>
    <item>
      <title>No data in app.</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156527#M14295</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;

&lt;P&gt;I've installed everything correctly and I have quite a lot of data being logged in splunk now (nearly 20GB per day). I can see when I search for one of the SQL servers in splunk as "host=servername" that it shows source = WinEventLog://Security and sourcetype = WinEventLog:Security so it's definitely logging data and indexing it in splunk.&lt;/P&gt;

&lt;P&gt;However, the Microsoft SQL Server App itself isn't showing any data.&lt;BR /&gt;
When I run all 5 lookup generators, they all show no results, despite me seeing data indexed in splunk for the SQl server.&lt;/P&gt;

&lt;P&gt;How can I get the app to find the data?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Feb 2014 11:31:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156527#M14295</guid>
      <dc:creator>Lazarix</dc:creator>
      <dc:date>2014-02-19T11:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: No data in app.</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156528#M14296</link>
      <description>&lt;P&gt;Closing this because nobody can seem to solve it, so I'm just going to stop using the app.&lt;/P&gt;

&lt;P&gt;Poor.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 14:56:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156528#M14296</guid>
      <dc:creator>Lazarix</dc:creator>
      <dc:date>2014-03-05T14:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: No data in app.</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156529#M14297</link>
      <description>&lt;P&gt;What index did you store the data in? if you did not store it in the "main" index, you may have to go and change all the saved searches etc to use the specified index as it will default to main i believe in the searches.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 15:04:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156529#M14297</guid>
      <dc:creator>aelliott</dc:creator>
      <dc:date>2014-03-05T15:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: No data in app.</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156530#M14298</link>
      <description>&lt;P&gt;Lazarix -&lt;/P&gt;

&lt;P&gt;If you have enterprise support, can you please open up a ticket and let me know the number in a private message?&lt;/P&gt;

&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 15:56:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156530#M14298</guid>
      <dc:creator>bosburn_splunk</dc:creator>
      <dc:date>2014-03-05T15:56:52Z</dc:date>
    </item>
    <item>
      <title>Re: No data in app.</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156531#M14299</link>
      <description>&lt;P&gt;The SQL app instructions don't include instructions for the other apps that you need - see &lt;A href="http://answers.splunk.com/answers/101202/sql-server-splunk-app-does-not-show-any-servers"&gt;http://answers.splunk.com/answers/101202/sql-server-splunk-app-does-not-show-any-servers&lt;/A&gt; for someone who is having the same problem. I'm still working through this myself, but at the very least you will need to ensure that powershell scripts can run.&lt;/P&gt;

&lt;P&gt;On your SQL server:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Start a Powershell window as an administrator&lt;/LI&gt;
&lt;LI&gt;Run "Get-ExecutionPolicy". You can see what the answer means at &lt;A href="http://technet.microsoft.com/library/hh847748.aspx"&gt;http://technet.microsoft.com/library/hh847748.aspx&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Run "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned (if that's suitable for you - I'm still testing)&lt;/LI&gt;
&lt;LI&gt;Run "Get-ExecutionPolicy" again to confirm the change.&lt;/LI&gt;
&lt;LI&gt;Try running a script manually to see what happens (any script will do)&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 09 Jun 2014 16:00:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156531#M14299</guid>
      <dc:creator>FunPolice</dc:creator>
      <dc:date>2014-06-09T16:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: No data in app.</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156532#M14300</link>
      <description>&lt;P&gt;I figured this one out, finally.  Here's what I did:&lt;BR /&gt;
Windows Server 2008 R2 and Windows 2012 R2 - Open Powershell as Administrator&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;PS C:\&amp;gt;Get-Execution Policy
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If it's Restricted, then do the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;PS C:\&amp;gt;Set-Execution Policy Bypass
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Say Yes to the Execution Policy Change.&lt;/P&gt;

&lt;P&gt;Then run Get-ExecutionPolicy and see that it changed to Bypass:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;PS C:\&amp;gt; Get-ExecutionPolicy
Bypass
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Once you have that done, now you'll need to make one more change.  &lt;/P&gt;

&lt;P&gt;Open your SQL Server Management Studio and log in as sysadmin (sa). Go to Security -&amp;gt;Logins -&amp;gt; NT AUTHORITY\SYSTEM (Properties) and grant the user &lt;STRONG&gt;sysadmin&lt;/STRONG&gt; Server Role.   Apply the change and restart your Splunk service.  (Thanks Adrian:  &lt;A href="http://answers.splunk.com/answers/108974/problem-with-powershell-and-splunk_for_sqlserver-app" target="_blank"&gt;http://answers.splunk.com/answers/108974/problem-with-powershell-and-splunk_for_sqlserver-app&lt;/A&gt;)  &lt;/P&gt;

&lt;P&gt;Once you have all these steps done, then go into the app and run the Lookup Table Rebuilder (Searches &amp;amp; Reports-&amp;gt;Lookup Table Rebuilder)&lt;/P&gt;

&lt;P&gt;Lastly, you can run the search: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=mssql | stats count, values(sourcetype) by host 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You should see the following source types show up:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;MSSQL:Database:Health
MSSQL:Host:Memory
MSSQL:Instance:Service
MSSQL:Instance:User
Powershell:ScriptExecutionSummary
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 28 Sep 2020 17:13:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/No-data-in-app/m-p/156532#M14300</guid>
      <dc:creator>amiracle</dc:creator>
      <dc:date>2020-09-28T17:13:57Z</dc:date>
    </item>
  </channel>
</rss>

