<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Forward additional Windows logs in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263537#M21461</link>
    <description>&lt;P&gt;Anyone have any other ideas?&lt;/P&gt;</description>
    <pubDate>Mon, 30 Jan 2017 13:18:48 GMT</pubDate>
    <dc:creator>bbazian</dc:creator>
    <dc:date>2017-01-30T13:18:48Z</dc:date>
    <item>
      <title>Forward additional Windows logs</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263532#M21456</link>
      <description>&lt;P&gt;I am trying to get additional logs sent to Splunk Cloud from a Windows domain controller.  I modified my inputs.conf file to add the additional logs but do not see them in the wineventlog index.  Am I missing something.  Here is the inputs.conf contents.&lt;/P&gt;

&lt;P&gt;[default]&lt;BR /&gt;
host = DC1&lt;/P&gt;

&lt;P&gt;[script://$SPLUNK_HOME\bin\scripts\splunk-wmi.path]&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;P&gt;[WinEventLog://Application]&lt;BR /&gt;
disabled = 0 &lt;BR /&gt;
[WinEventLog://Security]&lt;BR /&gt;
disabled = 0 &lt;BR /&gt;
[WinEventLog://System]&lt;BR /&gt;
disabled = 0 &lt;BR /&gt;
[WinEventLog://DNS Server]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
[WinEventLog://Directory Service]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
[WinEventLog://File Replication Service]&lt;BR /&gt;
disabled = 0&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jan 2017 12:14:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263532#M21456</guid>
      <dc:creator>bbazian</dc:creator>
      <dc:date>2017-01-29T12:14:04Z</dc:date>
    </item>
    <item>
      <title>Re: Forward additional Windows logs</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263533#M21457</link>
      <description>&lt;P&gt;Do you see any logs from this host?  If you search &lt;CODE&gt;index=* host=XYZ&lt;/CODE&gt; over the past 24 hours (or some other reasonable time frame) what do you get?&lt;/P&gt;

&lt;P&gt;Also, try adding &lt;CODE&gt;index = wineventlog&lt;/CODE&gt; into each of those stanzas to force them (hopefully) to the right index.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jan 2017 13:22:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263533#M21457</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-01-29T13:22:19Z</dc:date>
    </item>
    <item>
      <title>Re: Forward additional Windows logs</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263534#M21458</link>
      <description>&lt;P&gt;I do see the security, system and application logs.  Not the others that I have in the inputs.conf file.  Prior to the addition to the input.conf I saw those logs with the following config.&lt;/P&gt;

&lt;P&gt;[default]&lt;BR /&gt;
host = DC1&lt;/P&gt;

&lt;P&gt;[script://$SPLUNK_HOME\bin\scripts\splunk-wmi.path]&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;P&gt;I just added the individual log entries.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jan 2017 13:42:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263534#M21458</guid>
      <dc:creator>bbazian</dc:creator>
      <dc:date>2017-01-29T13:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: Forward additional Windows logs</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263535#M21459</link>
      <description>&lt;P&gt;Did you bump the service after modifying &lt;CODE&gt;inputs.conf&lt;/CODE&gt;?&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jan 2017 14:49:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263535#M21459</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2017-01-29T14:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: Forward additional Windows logs</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263536#M21460</link>
      <description>&lt;P&gt;Yes.  I restarted the Splunk service.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jan 2017 16:47:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263536#M21460</guid>
      <dc:creator>bbazian</dc:creator>
      <dc:date>2017-01-29T16:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: Forward additional Windows logs</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263537#M21461</link>
      <description>&lt;P&gt;Anyone have any other ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 13:18:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263537#M21461</guid>
      <dc:creator>bbazian</dc:creator>
      <dc:date>2017-01-30T13:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: Forward additional Windows logs</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263538#M21462</link>
      <description>&lt;P&gt;I do see the the Directory Service log in the default index.  I changed the inputs.conf file to read as below.  We will see what that does.&lt;/P&gt;

&lt;P&gt;[default]&lt;BR /&gt;
host = OKDC1&lt;/P&gt;

&lt;P&gt;[script://$SPLUNK_HOME\bin\scripts\splunk-wmi.path]&lt;BR /&gt;
index = wineventlog&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;P&gt;[WinEventLog://Application]&lt;BR /&gt;
index = wineventlog&lt;BR /&gt;
disabled = 0 &lt;/P&gt;

&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;
index = wineventlog&lt;BR /&gt;
disabled = 0 &lt;/P&gt;

&lt;P&gt;[WinEventLog://System]&lt;BR /&gt;
index = wineventlog&lt;BR /&gt;
disabled = 0 &lt;/P&gt;

&lt;P&gt;[WinEventLog://DNS Server]&lt;BR /&gt;
index = wineventlog&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
index = wineventlog&lt;/P&gt;

&lt;P&gt;[WinEventLog://Directory Service]&lt;BR /&gt;
index = wineventlog&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;P&gt;[WinEventLog://File Replication Service]&lt;BR /&gt;
index = wineventlog&lt;BR /&gt;
disabled = 0&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 13:28:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263538#M21462</guid>
      <dc:creator>bbazian</dc:creator>
      <dc:date>2017-01-30T13:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: Forward additional Windows logs</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263539#M21463</link>
      <description>&lt;P&gt;I am now seeing the info for the Directory Service in the wineventlog.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 13:49:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263539#M21463</guid>
      <dc:creator>bbazian</dc:creator>
      <dc:date>2017-01-30T13:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: Forward additional Windows logs</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263540#M21464</link>
      <description>&lt;P&gt;Please check the permissions on the event logs.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://blogs.technet.microsoft.com/janelewis/2010/04/30/giving-non-administrators-permission-to-read-event-logs-windows-2003-and-windows-2008/"&gt;https://blogs.technet.microsoft.com/janelewis/2010/04/30/giving-non-administrators-permission-to-read-event-logs-windows-2003-and-windows-2008/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 13:53:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Forward-additional-Windows-logs/m-p/263540#M21464</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2017-01-30T13:53:22Z</dc:date>
    </item>
  </channel>
</rss>

