<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Eventtype errors using splunk app for windows infrastructure in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503501#M62003</link>
    <description>&lt;P&gt;Hi afolabia,&lt;BR /&gt;
you have three solutions:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;add the indexes of this app to the default search path for all the interested roles;&lt;/LI&gt;
&lt;LI&gt;create a new eventtype (e.g. wineventlog) in which you have only the filter &lt;CODE&gt;index=wineventlog&lt;/CODE&gt; and the add this eventtype to the others;&lt;/LI&gt;
&lt;LI&gt;add to all the eventtypes the filter &lt;CODE&gt;index=wineventlog&lt;/CODE&gt;.&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;.&lt;/P&gt;

&lt;P&gt;The second solution is longer but, for my idea, prefereable because has best performances.&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
    <pubDate>Mon, 14 Oct 2019 12:30:34 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2019-10-14T12:30:34Z</dc:date>
    <item>
      <title>Eventtype errors using splunk app for windows infrastructure</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503500#M62002</link>
      <description>&lt;P&gt;How do I resolve splunk app for windows infrastructure event types errors in a distributed environment? They are all enabled but not producing and results.&lt;BR /&gt;
Eventtype 'perfmon_windows' does not exist or is disabled.&lt;BR /&gt;
Eventtype 'wineventlog_windows' does not exist or is disabled.&lt;BR /&gt;
Eventtype 'wineventlog_security' does not exist or is disabled.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 02:36:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503500#M62002</guid>
      <dc:creator>afolabia</dc:creator>
      <dc:date>2020-09-30T02:36:51Z</dc:date>
    </item>
    <item>
      <title>Re: Eventtype errors using splunk app for windows infrastructure</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503501#M62003</link>
      <description>&lt;P&gt;Hi afolabia,&lt;BR /&gt;
you have three solutions:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;add the indexes of this app to the default search path for all the interested roles;&lt;/LI&gt;
&lt;LI&gt;create a new eventtype (e.g. wineventlog) in which you have only the filter &lt;CODE&gt;index=wineventlog&lt;/CODE&gt; and the add this eventtype to the others;&lt;/LI&gt;
&lt;LI&gt;add to all the eventtypes the filter &lt;CODE&gt;index=wineventlog&lt;/CODE&gt;.&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;.&lt;/P&gt;

&lt;P&gt;The second solution is longer but, for my idea, prefereable because has best performances.&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 12:30:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503501#M62003</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2019-10-14T12:30:34Z</dc:date>
    </item>
    <item>
      <title>Re: Eventtype errors using splunk app for windows infrastructure</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503502#M62004</link>
      <description>&lt;P&gt;Thanks, but should i be doing that since all I'm using is the default TA's for windows infrastructure and windows? Also, I do have the eventtype with these included.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 13:41:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503502#M62004</guid>
      <dc:creator>afolabia</dc:creator>
      <dc:date>2019-10-15T13:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: Eventtype errors using splunk app for windows infrastructure</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503503#M62005</link>
      <description>&lt;P&gt;Hi afolabia,&lt;BR /&gt;
I agree with you and I don't know why in many apps there aren't eventtypes with index.&lt;BR /&gt;
As I said, you can also put the indexes in the default search path for all the roles you have, but in my installations I always customized eventtypes.&lt;BR /&gt;
If you want, it's another way to give value to your work!&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 14:28:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503503#M62005</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2019-10-15T14:28:47Z</dc:date>
    </item>
    <item>
      <title>Re: Eventtype errors using splunk app for windows infrastructure</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503504#M62006</link>
      <description>&lt;P&gt;Problem solved:&lt;BR /&gt;
It seems to be more of a permission issue. I access the SH and did a recursive permission change for the Splunk_TA_windows. Check the box for "Replace all child object permissions with inheritable permissions from this object", and restarted splunkd.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 02:38:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503504#M62006</guid>
      <dc:creator>afolabia</dc:creator>
      <dc:date>2020-09-30T02:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: Eventtype errors using splunk app for windows infrastructure</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/549219#M65471</link>
      <description>&lt;P&gt;These KOs (and other things) are defined in the&amp;nbsp;&lt;STRONG&gt;Splunk_TA_windows&lt;/STRONG&gt; app which should always be deployed together with the &lt;STRONG&gt;splunk_app_windows_infrastructure&lt;/STRONG&gt; app.&lt;/P&gt;</description>
      <pubDate>Sat, 24 Apr 2021 16:51:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/549219#M65471</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2021-04-24T16:51:20Z</dc:date>
    </item>
  </channel>
</rss>

