<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Add-On for Microsoft IIS Default Settings in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322425#M38574</link>
    <description>&lt;P&gt;Typically, IIS logs are ingested directly from the web server using a universal forwarder.  Take a look at the documentation for the Add-on &lt;A href="http://docs.splunk.com/Documentation/AddOns/released/MSIIS/Setupaddon"&gt;here&lt;/A&gt;.  I'm not sure if that gets you around the issue of not logging the host or not.&lt;/P&gt;</description>
    <pubDate>Sat, 09 Sep 2017 15:57:06 GMT</pubDate>
    <dc:creator>kmorris_splunk</dc:creator>
    <dc:date>2017-09-09T15:57:06Z</dc:date>
    <item>
      <title>Splunk Add-On for Microsoft IIS Default Settings</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322424#M38573</link>
      <description>&lt;P&gt;This application includes several FIELDALIAS comands in props.conf for the sourcetypes defined. One of these is "FIELDALIAS-s_computername = s_computername as host" which reassigns the host value at search time from the value of s_computername in the event. We don't log the host name in all of our IIS events so Splunk pulled the port (80 or 443) into this field resulting in the majority of our events showing the port for the host.&lt;/P&gt;

&lt;P&gt;My question is: Is it a standard practice to send IIS logs through a syslog server? This setting seems like it would only be only helpful under that scenario. If IIS logs are sent through a syslog server then I would need to have IIS include the hostname so I could pull it from there. Otherwise all events would have the syslog server as the host.&lt;/P&gt;

&lt;P&gt;If it is not a standard practice, and I don't think it is, why is this a default setting in the app?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:38:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322424#M38573</guid>
      <dc:creator>timpacl</dc:creator>
      <dc:date>2020-09-29T15:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-On for Microsoft IIS Default Settings</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322425#M38574</link>
      <description>&lt;P&gt;Typically, IIS logs are ingested directly from the web server using a universal forwarder.  Take a look at the documentation for the Add-on &lt;A href="http://docs.splunk.com/Documentation/AddOns/released/MSIIS/Setupaddon"&gt;here&lt;/A&gt;.  I'm not sure if that gets you around the issue of not logging the host or not.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Sep 2017 15:57:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322425#M38574</guid>
      <dc:creator>kmorris_splunk</dc:creator>
      <dc:date>2017-09-09T15:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-On for Microsoft IIS Default Settings</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322426#M38575</link>
      <description>&lt;P&gt;Thanks kmorris. The solution was to comment out the offending line. Since this is a search time config, that fixed the issue retroactively. &lt;/P&gt;

&lt;P&gt;The question, however, is why is that setting enabled by default? It seems to support an infrequent use case which means it should not be enabled by default.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2017 21:42:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322426#M38575</guid>
      <dc:creator>timpacl</dc:creator>
      <dc:date>2017-09-11T21:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-On for Microsoft IIS Default Settings</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322427#M38576</link>
      <description>&lt;P&gt;Thanks for the follow up with the solution!&lt;/P&gt;</description>
      <pubDate>Wed, 08 Aug 2018 11:01:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322427#M38576</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2018-08-08T11:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-On for Microsoft IIS Default Settings</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322428#M38577</link>
      <description>&lt;P&gt;I changed the line&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;FIELDALIAS-s_computername = s_computername as host
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;to&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;FIELDALIAS-s_computername = s_computername ASNEW host
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;so it won't overwrite the value with null() since my IIS logs don't have s_computername field&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 18:32:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322428#M38577</guid>
      <dc:creator>guarisma</dc:creator>
      <dc:date>2019-10-23T18:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-On for Microsoft IIS Default Settings</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322429#M38578</link>
      <description>&lt;P&gt;a lot has changed in the way you set up parsing addons since this was initially made.  Back in Splunk 6.x normally you would see FIELDALIAS rules for all fields that the data provided to normalize it. &lt;/P&gt;

&lt;P&gt;FIELDALIAS frequently causes problems now due to the new way it works, and NULLs overriding actual data is a problem if there is no source field matching the FIELDALIAS definition.  Back in Splunk 6.x, you would not have this issue, as the lack of a source field (s_computername) would result in the FIELDALIAS getting skipped, and the host field you already had would still be there when you search.&lt;/P&gt;

&lt;P&gt;On the other hand, overriding host for Splunk data on a forwarder is unneccessary in most cases, as the host field would already exist, it would make sense for the maintainer of this add-on to remove or disable this one in particular.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 17:35:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-On-for-Microsoft-IIS-Default-Settings/m-p/322429#M38578</guid>
      <dc:creator>mhessel</dc:creator>
      <dc:date>2020-01-24T17:35:58Z</dc:date>
    </item>
  </channel>
</rss>

