<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ingestion of Windows events works correctly in the classic WinEventLog format but not in the XmlWinEventLog format in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/671355#M18057</link>
    <description>&lt;P&gt;The thing I could suggest is enabling debug and trying to look into forwarder's logs but that's a long shot and I have really no concrete advice what to look for. Kinda like "exploratory surgery".&lt;/P&gt;</description>
    <pubDate>Sat, 09 Dec 2023 09:20:05 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2023-12-09T09:20:05Z</dc:date>
    <item>
      <title>Ingestion of Windows events works correctly in the classic WinEventLog format but not in the XmlWinEventLog format</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/670467#M17966</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;I got a weird issue, that I struggle to troubleshoot.&lt;/P&gt;&lt;P&gt;A month ago, I realized that my WinEventLog logs were consuming too much of my licenses, so I decided to index them in the XmlWinEventLog format. To do this, I simply modified the inputs.conf file of my Universal Forwarder.&lt;BR /&gt;&lt;BR /&gt;I changed from this configuration :&lt;/P&gt;&lt;PRE&gt;[WinEventLog://Security] &lt;BR /&gt;disabled = 0 &lt;BR /&gt;start_from = oldest&lt;BR /&gt;current_only = 0&lt;BR /&gt;evt_resolve_ad_obj = 1&lt;BR /&gt;checkpointInterval = 5&lt;BR /&gt;blacklist1 = EventCode="4662" Message="Object Type:(?!\sgroupPolicyContainer)"&lt;BR /&gt;blacklist2 = EventCode="566" Message="Object Type:(?!\sgroupPolicyContainer)"&lt;BR /&gt;renderXml = false&lt;BR /&gt;sourcetype = WinEventLog&lt;BR /&gt;index = wineventlog&lt;/PRE&gt;&lt;P&gt;To this configuration:&lt;/P&gt;&lt;PRE&gt;[WinEventLog://Security] &lt;BR /&gt;disabled = 0 &lt;BR /&gt;start_from = oldest&lt;BR /&gt;current_only = 0&lt;BR /&gt;evt_resolve_ad_obj = 1&lt;BR /&gt;checkpointInterval = 5&lt;BR /&gt;blacklist1 = EventCode="4662" Message="Object Type:(?!\sgroupPolicyContainer)"&lt;BR /&gt;blacklist2 = EventCode="566" Message="Object Type:(?!\sgroupPolicyContainer)"&lt;BR /&gt;renderXml = true&lt;BR /&gt;sourcetype = XmlWinEventLog&lt;BR /&gt;index = wineventlog&lt;/PRE&gt;&lt;P&gt;Then I started receiving events and my license usage reduced, which made me happy. However, upon closer observation, I realized that I wasn't receiving all the events as before. Indeed, I now observe that the event frequency of the XmlWinEventLog logs is random.&lt;/P&gt;&lt;P&gt;You can observe this on these timelines :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MCH2018_0-1701439929580.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/28328i7C68A5FF9B543A94/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MCH2018_0-1701439929580.png" alt="MCH2018_0-1701439929580.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And in the metrics :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MCH2018_1-1701439945037.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/28329i315190D0F1264C58/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MCH2018_1-1701439945037.png" alt="MCH2018_1-1701439945037.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the other hand, with the WinEventLog format, I have no issues:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MCH2018_2-1701439959223.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/28330iB2AC2F256F3C193E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MCH2018_2-1701439959223.png" alt="MCH2018_2-1701439959223.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried reinstalling the UF, there are no interesting errors in the splunkd.log, and I am out of ideas for troubleshooting.&lt;BR /&gt;Thank you for your help.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 14:14:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/670467#M17966</guid>
      <dc:creator>MCH2018</dc:creator>
      <dc:date>2023-12-01T14:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: Ingestion of Windows events works correctly in the classic WinEventLog format but not in the XmlWinEventLog format</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/670529#M17973</link>
      <description>&lt;P&gt;&amp;nbsp;Your blacklist regex expressions may not be compatible with with the XML format for your indexed events.&lt;/P&gt;&lt;P&gt;Referenced from &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWindowseventlogdata#Use_blacklists_and_whitelists_to_filter_on_XML-based_events" target="_self"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWindowseventlogdata#Use_blacklists_and_whitelists_to_filter_on_XML-based_events :&lt;/A&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Render event data as extensible markup language (XML) supplied by the Windows Event Log subsystem. This setting is optional.&lt;P&gt;A value of 1 or true means to render the events as XML. A value of 0 or false means to render the events as plain text.&lt;/P&gt;&lt;P class=""&gt;If you set renderXml to true, and if you want to also create allow lists or deny lists to filter event data, you must use the $XmlRegex special key in your allow lists or deny lists.&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;0 (false)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Sat, 02 Dec 2023 15:01:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/670529#M17973</guid>
      <dc:creator>azteksites</dc:creator>
      <dc:date>2023-12-02T15:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Ingestion of Windows events works correctly in the classic WinEventLog format but not in the XmlWinEventLog format</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/670783#M18002</link>
      <description>&lt;P&gt;Thanks for your help, I haven't been able to test your solution yet.&lt;BR /&gt;I'm supposed to do it this week, so I'll get back to you.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2023 10:00:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/670783#M18002</guid>
      <dc:creator>MCH2018</dc:creator>
      <dc:date>2023-12-05T10:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: Ingestion of Windows events works correctly in the classic WinEventLog format but not in the XmlWinEventLog format</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/670821#M18006</link>
      <description>&lt;P&gt;While the blacklist format might not be compatible with the XML event format, that should not cause decrease of the number of events, quite the contrary.&lt;/P&gt;&lt;P&gt;I'd check firstly whether your overall number of events (not just bursts) indeed did decrease. In other words - are you indeed losing events or are are they by any chance getting "choked" but finally get through in shorter but higher-thruput bursts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2023 13:22:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/670821#M18006</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-12-05T13:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: Ingestion of Windows events works correctly in the classic WinEventLog format but not in the XmlWinEventLog format</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/670845#M18007</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;That was one of my theories, but unfortunately, after checking, we do have some missing events.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;We only receive random events in XML and all events in wineventlog format.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2023 14:22:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/670845#M18007</guid>
      <dc:creator>MCH2018</dc:creator>
      <dc:date>2023-12-05T14:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: Ingestion of Windows events works correctly in the classic WinEventLog format but not in the XmlWinEventLog format</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/671240#M18052</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Unfortunatly, this solution doesn't solve anything.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2023 09:19:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/671240#M18052</guid>
      <dc:creator>MCH2018</dc:creator>
      <dc:date>2023-12-08T09:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: Ingestion of Windows events works correctly in the classic WinEventLog format but not in the XmlWinEventLog format</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/671355#M18057</link>
      <description>&lt;P&gt;The thing I could suggest is enabling debug and trying to look into forwarder's logs but that's a long shot and I have really no concrete advice what to look for. Kinda like "exploratory surgery".&lt;/P&gt;</description>
      <pubDate>Sat, 09 Dec 2023 09:20:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Ingestion-of-Windows-events-works-correctly-in-the-classic/m-p/671355#M18057</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-12-09T09:20:05Z</dc:date>
    </item>
  </channel>
</rss>

