<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: eventid.net in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/eventid-net/m-p/481810#M59239</link>
    <description>&lt;P&gt;can you run a btool on the uf , just to check what inputs.conf it is getting ?&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jan 2020 04:57:06 GMT</pubDate>
    <dc:creator>jarizeloyola</dc:creator>
    <dc:date>2020-01-15T04:57:06Z</dc:date>
    <item>
      <title>eventid.net</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/eventid-net/m-p/481807#M59236</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;

&lt;P&gt;Could you help me in resolving my issue I cannot address?&lt;BR /&gt;
I installed Add-on for Microsoft Windows and did everything according to instruction. Now, Splunk is receiving logs from 1 windows computer. I can see them in the data summary. The next step was the installation  eventid.net app to consolidate and visualize received logs. However, when I installed and configure it according to the instruction, eventid.net does not show any logs on its dashboards. &lt;BR /&gt;
I have no idea where should I look into to find out why eventid does not work. Please, could you help me in troubleshooting this problem?   I am ready to provide any screenshots of my configuration. &lt;/P&gt;

&lt;P&gt;These are some details of my configuration.&lt;BR /&gt;
I configured inputs.conf that is located in /opt/splunk/etc/apps/Splunk_TA_windows/local having indicated the following configuration:&lt;BR /&gt;
[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
start_from = oldest&lt;BR /&gt;
current_only = 0&lt;BR /&gt;
evt_resolve_ad_obj = 1&lt;BR /&gt;
checkpointInterval = 5&lt;BR /&gt;
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;
blacklist2 = EventCode="566" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;
index = wineventlog&lt;BR /&gt;
renderXml=false&lt;/P&gt;

&lt;P&gt;I also copied this configuration to the deployment server (/opt/splunk/etc/deployment-apps/Splunk_TA_windows/local). The configuration is successfully transmitted to the computer with Universal Forwarder. (I checked the configuration of the UF)&lt;/P&gt;

&lt;P&gt;However, when I look at event logs in the "Search and Report", I see that logs are coming with the index = "main" instead of "wineventlog" as I pointed in the inputs.conf&lt;BR /&gt;
selected fields:&lt;BR /&gt;
host = ComputerNAME&lt;BR /&gt;
index = main&lt;BR /&gt;
source = XmlWinEventLog:Security&lt;BR /&gt;
sourcetype = XmlWinEventLog&lt;/P&gt;

&lt;P&gt;I do not understand why event logs are coming with the index = main.&lt;BR /&gt;
I configured eventid.net in the following way:&lt;BR /&gt;
"The EventId App will analyze the specified index: (index="wineventlog" OR source=XmlWinEventLog*)"&lt;BR /&gt;
Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:37:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/eventid-net/m-p/481807#M59236</guid>
      <dc:creator>m1ster1985</dc:creator>
      <dc:date>2020-09-30T03:37:59Z</dc:date>
    </item>
    <item>
      <title>Re: eventid.net</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/eventid-net/m-p/481808#M59237</link>
      <description>&lt;P&gt;Is the configuration in the inputs.conf sending to the right index?&lt;BR /&gt;
Is the data is stored in a different index?  you  can update  the macros.conf [event_sources] section.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 14:04:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/eventid-net/m-p/481808#M59237</guid>
      <dc:creator>jarizeloyola</dc:creator>
      <dc:date>2020-01-10T14:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: eventid.net</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/eventid-net/m-p/481809#M59238</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;This is the first problem. I configured inputs.conf  that is located in /opt/splunk/etc/apps/Splunk_TA_windows/local having indicated the following configuration:&lt;BR /&gt;
[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
start_from = oldest&lt;BR /&gt;
current_only = 0&lt;BR /&gt;
evt_resolve_ad_obj = 1&lt;BR /&gt;
checkpointInterval = 5&lt;BR /&gt;
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;
blacklist2 = EventCode="566" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;
index = wineventlog&lt;BR /&gt;
renderXml=false&lt;/P&gt;

&lt;P&gt;I also copied this configuration to the deployment server (/opt/splunk/etc/deployment-apps/Splunk_TA_windows/local). The configuration is successfully transmitted to the computer with Universal Forwarder. (I checked the configuration of the UF)&lt;/P&gt;

&lt;P&gt;However, when I look at event logs in the "Search and Report", I see that logs are coming with the index = "main" instead of "wineventlog" as I pointed in the inputs.conf&lt;BR /&gt;
selected fields:&lt;BR /&gt;
host = ComputerNAME&lt;BR /&gt;
index = main&lt;BR /&gt;
source = XmlWinEventLog:Security &lt;BR /&gt;
sourcetype = XmlWinEventLog&lt;/P&gt;

&lt;P&gt;I have no idea why event logs are coming with the index = main.&lt;BR /&gt;
I configured eventid.net in the following way:&lt;BR /&gt;
"The EventId App will analyze the specified index:  (index="wineventlog" OR source=XmlWinEventLog*)"&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:42:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/eventid-net/m-p/481809#M59238</guid>
      <dc:creator>m1ster1985</dc:creator>
      <dc:date>2020-09-30T03:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: eventid.net</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/eventid-net/m-p/481810#M59239</link>
      <description>&lt;P&gt;can you run a btool on the uf , just to check what inputs.conf it is getting ?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 04:57:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/eventid-net/m-p/481810#M59239</guid>
      <dc:creator>jarizeloyola</dc:creator>
      <dc:date>2020-01-15T04:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: eventid.net</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/eventid-net/m-p/481811#M59240</link>
      <description>&lt;P&gt;Unfortunately, I can't copy the output of the btool command because it is too big and can't attach a file due to a lack of point for karma. &lt;BR /&gt;
Probably, you want to see particular strings? &lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 05:14:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/eventid-net/m-p/481811#M59240</guid>
      <dc:creator>m1ster1985</dc:creator>
      <dc:date>2020-01-15T05:14:49Z</dc:date>
    </item>
  </channel>
</rss>

