<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MS SQL APP without data in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/MS-SQL-APP-without-data/m-p/170866#M72618</link>
    <description>&lt;P&gt;I forgot to say one thing. MS SQL APP version is 0.1.7 which supports splunk 5.&lt;/P&gt;</description>
    <pubDate>Sun, 08 Dec 2013 13:39:50 GMT</pubDate>
    <dc:creator>anthonychen</dc:creator>
    <dc:date>2013-12-08T13:39:50Z</dc:date>
    <item>
      <title>MS SQL APP without data</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/MS-SQL-APP-without-data/m-p/170865#M72617</link>
      <description>&lt;P&gt;Hi all,&lt;BR /&gt;
   I am new here. I just using Splunk App for Microsoft SQL Server but without any data.&lt;BR /&gt;
1 My splunk server version is 5.0.6&lt;BR /&gt;
2 windows 2008 server sp2 + MS SQL 2008 server enterprise&lt;BR /&gt;&lt;BR /&gt;
3 I followed all step of installation document. I do see security eventcode 33205&lt;BR /&gt;
When I using sourcetype="WinEventLog:Security" at splunk search bar , I got the following result. &lt;/P&gt;

&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;
12/08/2013 08:52:05 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=MSSQLSERVER$AUDIT&lt;BR /&gt;
EventCode=33205&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=info&lt;BR /&gt;
ComputerName=WIN-DZ8JDWE5XJV&lt;BR /&gt;
User=Administrator&lt;BR /&gt;
Sid=S-1-5-21-452095144-2453852085-683102615-500&lt;BR /&gt;
SidType=1&lt;BR /&gt;
host=WIN-DZ8JDWE5XJV  sourcetype=WinEventLog:Security  source=WinEventLog:Security &lt;BR /&gt;
&lt;BR /&gt;&lt;BR /&gt;
When I run the lookup generator on this app, I got no result of all 5 lookup. &lt;BR /&gt;
Does anybody know what should I do or missing something? Please advise.&lt;BR /&gt;
Thank you very much!&lt;/P&gt;

&lt;P&gt;Anthony&lt;/P&gt;</description>
      <pubDate>Sun, 08 Dec 2013 13:21:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/MS-SQL-APP-without-data/m-p/170865#M72617</guid>
      <dc:creator>anthonychen</dc:creator>
      <dc:date>2013-12-08T13:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: MS SQL APP without data</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/MS-SQL-APP-without-data/m-p/170866#M72618</link>
      <description>&lt;P&gt;I forgot to say one thing. MS SQL APP version is 0.1.7 which supports splunk 5.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Dec 2013 13:39:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/MS-SQL-APP-without-data/m-p/170866#M72618</guid>
      <dc:creator>anthonychen</dc:creator>
      <dc:date>2013-12-08T13:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: MS SQL APP without data</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/MS-SQL-APP-without-data/m-p/170867#M72619</link>
      <description>&lt;P&gt;Hi Anthony I am also a newpie for splunk and even i am facing same issue which you have mentioned above ,can you please help out to resolve this issue if you have found any solution for this &lt;/P&gt;

&lt;P&gt;Can someone do the needful help for us to resolve this issue&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2014 20:20:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/MS-SQL-APP-without-data/m-p/170867#M72619</guid>
      <dc:creator>nagadeepthi</dc:creator>
      <dc:date>2014-01-16T20:20:26Z</dc:date>
    </item>
    <item>
      <title>Re: MS SQL APP without data</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/MS-SQL-APP-without-data/m-p/170868#M72620</link>
      <description>&lt;P&gt;I figured this one out, finally.  Here's what I did:&lt;BR /&gt;
Windows Server 2008 R2 and Windows 2012 R2 - Open Powershell as Administrator&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;PS C:\&amp;gt;Get-Execution Policy
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If it's Restricted, then do the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;PS C:\&amp;gt;Set-Execution Policy Bypass
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Say Yes to the Execution Policy Change.&lt;/P&gt;

&lt;P&gt;Then run Get-ExecutionPolicy and see that it changed to Bypass:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;PS C:\&amp;gt; Get-ExecutionPolicy
Bypass
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Once you have that done, now you'll need to make one more change.  &lt;/P&gt;

&lt;P&gt;Open your SQL Server Management Studio and log in as sysadmin (sa). Go to Security -&amp;gt;Logins -&amp;gt; NT AUTHORITY\SYSTEM (Properties) and grant the user &lt;STRONG&gt;sysadmin&lt;/STRONG&gt; Server Role.   Apply the change and restart your Splunk service.  (Thanks Adrian:  &lt;A href="http://answers.splunk.com/answers/108974/problem-with-powershell-and-splunk_for_sqlserver-app" target="_blank"&gt;http://answers.splunk.com/answers/108974/problem-with-powershell-and-splunk_for_sqlserver-app&lt;/A&gt;)  &lt;/P&gt;

&lt;P&gt;Once you have all these steps done, then go into the app and run the Lookup Table Rebuilder (Searches &amp;amp; Reports-&amp;gt;Lookup Table Rebuilder)&lt;/P&gt;

&lt;P&gt;Lastly, you can run the search: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=mssql | stats count, values(sourcetype) by host 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You should see the following source types show up:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;MSSQL:Database:Health
MSSQL:Host:Memory
MSSQL:Instance:Service
MSSQL:Instance:User
Powershell:ScriptExecutionSummary
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 28 Sep 2020 17:14:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/MS-SQL-APP-without-data/m-p/170868#M72620</guid>
      <dc:creator>amiracle</dc:creator>
      <dc:date>2020-09-28T17:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: MS SQL APP without data</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/MS-SQL-APP-without-data/m-p/170869#M72621</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I am seeing the below; WinEventLog:Application&lt;BR /&gt;
WinEventLog:Security&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jul 2018 12:19:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/MS-SQL-APP-without-data/m-p/170869#M72621</guid>
      <dc:creator>hnakhle</dc:creator>
      <dc:date>2018-07-19T12:19:31Z</dc:date>
    </item>
  </channel>
</rss>

