<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Index, source and sourceType for splunk_ta_windows in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655745#M111101</link>
    <description>&lt;P&gt;yes i see some sourcetypes when i do only search using index= and in event i see some sourcetypes.&lt;/P&gt;</description>
    <pubDate>Sun, 27 Aug 2023 19:38:11 GMT</pubDate>
    <dc:creator>yr</dc:creator>
    <dc:date>2023-08-27T19:38:11Z</dc:date>
    <item>
      <title>Splunk_ta_windows: Why are Index, source, and sourceType missing from my search?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655721#M111096</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I have installed splunk_ta_windows using deployment server using UF on windows clients and everything is fine.&amp;nbsp; I created index and pointed in inputs.conf and all looks good.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i also search data fine but some sources and sourcetypes are missing when i input the query.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2023 18:30:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655721#M111096</guid>
      <dc:creator>yr</dc:creator>
      <dc:date>2023-08-28T18:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655734#M111097</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/256504"&gt;@yr&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;which ones are missing?&lt;/P&gt;&lt;P&gt;Are you sure to tha those logs?&lt;/P&gt;&lt;P&gt;Are they missing always or only&amp;nbsp; sometimes?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Sun, 27 Aug 2023 08:36:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655734#M111097</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-08-27T08:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655738#M111099</link>
      <description>&lt;P&gt;Hi Gcusello&lt;/P&gt;&lt;P&gt;Let me give you little more detail.&lt;/P&gt;&lt;P&gt;a. we use custom index&amp;nbsp;&lt;/P&gt;&lt;P&gt;b. we deployed splunk_ta_windows using deloyment server&lt;/P&gt;&lt;P&gt;c. we have modify inputs.conf on deployment server&lt;/P&gt;&lt;P&gt;d. inputs.conf has index=&amp;lt;our index name&amp;gt; in each stanza&lt;/P&gt;&lt;P&gt;e. we used default inputs.conf and changed the index to our&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now we see windows log data if we use in search and specify index name but if we ud thru sourcetype than data does not search, also we see only few sourcetypes.&lt;/P&gt;&lt;P&gt;your help is appreciated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Aug 2023 15:27:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655738#M111099</guid>
      <dc:creator>yr</dc:creator>
      <dc:date>2023-08-27T15:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655741#M111100</link>
      <description>&lt;P&gt;And what sourcetype would you expect? And do you have inputs producing events with those sourcetypes?&lt;/P&gt;</description>
      <pubDate>Sun, 27 Aug 2023 18:50:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655741#M111100</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-08-27T18:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655745#M111101</link>
      <description>&lt;P&gt;yes i see some sourcetypes when i do only search using index= and in event i see some sourcetypes.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Aug 2023 19:38:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655745#M111101</guid>
      <dc:creator>yr</dc:creator>
      <dc:date>2023-08-27T19:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655748#M111102</link>
      <description>&lt;P&gt;Again - &lt;STRONG&gt;what&lt;/STRONG&gt; sourcetypes did you expect?&lt;/P&gt;</description>
      <pubDate>Sun, 27 Aug 2023 21:55:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655748#M111102</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-08-27T21:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655781#M111107</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/256504"&gt;@yr&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;as I already asked:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;which sourcetypes are missing?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are they missing always or only&amp;nbsp; sometimes?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;did you checked that in the missing sourcetypes you have disabled=0? because by default all the inputs are disabled.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2023 07:52:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655781#M111107</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-08-28T07:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655855#M111112</link>
      <description>&lt;P&gt;I only get sourcetype wineventlog but when i add to security or application or system than does not search&amp;nbsp; any.&lt;/P&gt;&lt;P&gt;i have disabled=0 in all inputs.conf stanza&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for your help&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2023 14:35:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655855#M111112</guid>
      <dc:creator>yr</dc:creator>
      <dc:date>2023-08-28T14:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655865#M111114</link>
      <description>&lt;P&gt;Events from EventLog are ingested with WinEventLog (or XmlWinEventLog if you're ingesting them as XML)&amp;nbsp; sourcetype. There should be no other sourcetypes. The events are distinguishable by source (not sourcetype).&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2023 15:38:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655865#M111114</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-08-28T15:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655868#M111115</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/256504"&gt;@yr&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;as&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;sais, you have only one sourcetype:&amp;nbsp;&lt;SPAN&gt;WinEventLog (or XmlWinEventLog if you're ingesting them as XML), it was chenged: before you have wineventlog:Security.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You can distinguish logs based on source.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ciao.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Giuseppe&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2023 15:42:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655868#M111115</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-08-28T15:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655873#M111116</link>
      <description>&lt;P&gt;Hello Friends,&lt;/P&gt;&lt;P&gt;here is my snipped of inputs.conf tog et you an idea or may be mistaked on my end ??&lt;/P&gt;&lt;P&gt;again thank you for your help&lt;/P&gt;&lt;P&gt;------------------&lt;/P&gt;&lt;P&gt;This is my snip of inputs.conf&lt;/P&gt;&lt;P&gt;# cat inputs.conf&lt;BR /&gt;[perfmon://CPU]&lt;BR /&gt;counters = % C1 Time;% C2 Time;% Idle Time;% Processor Time;% User Time;% Privileged Time;% Reserved Time;% Interrupt Time&lt;BR /&gt;instances = *&lt;BR /&gt;interval = 30&lt;BR /&gt;mode = single&lt;BR /&gt;object = Processor&lt;BR /&gt;_meta = os::"Microsoft Windows Server 2012 R2 Standard" os_version::6.3.9600 entity_type::Windows_Host&lt;BR /&gt;useEnglishOnly = true&lt;BR /&gt;sourcetype = PerfmonMetrics:CPU&lt;BR /&gt;disabled = 0&lt;BR /&gt;index=uat&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[perfmon://Memory]&lt;BR /&gt;counters = Cache Bytes;% Committed Bytes In Use;Page Reads/sec;Pages Input/sec;Pages Output/sec;Committed Bytes;Available Bytes&lt;BR /&gt;interval = 30&lt;BR /&gt;mode = single&lt;BR /&gt;object = Memory&lt;BR /&gt;_meta = os::"Microsoft Windows Server 2012 R2 Standard" os_version::6.3.9600 entity_type::Windows_Host&lt;BR /&gt;useEnglishOnly = true&lt;BR /&gt;sourcetype = PerfmonMetrics:Memory&lt;BR /&gt;disabled = 0&lt;BR /&gt;index=uat&lt;/P&gt;&lt;P&gt;[WinEventLog://Application]&lt;BR /&gt;disabled = 0&lt;BR /&gt;start_from = oldest&lt;BR /&gt;current_only = 0&lt;BR /&gt;checkpointInterval = 10&lt;BR /&gt;renderXml=true&lt;BR /&gt;sourcetype = WinEventLog:Application&lt;BR /&gt;index=uat&lt;/P&gt;&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;disabled = 0&lt;BR /&gt;start_from = oldest&lt;BR /&gt;current_only = 0&lt;BR /&gt;evt_resolve_ad_obj = 1&lt;BR /&gt;checkpointInterval = 10&lt;BR /&gt;renderXml=true&lt;/P&gt;&lt;P&gt;blacklist1 = EventCode="(4662|566)" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;blacklist2 = EventCode="(4656|4670|4663|4703|4658|4688)" Message="Account Name:(\W+\w+$)"&lt;BR /&gt;blacklist3 = EventCode="4624" Message="An account was successfully logged on"&lt;BR /&gt;blacklist4 = EventCode="(4688|4689)" Message="%SplunkUniversalForwarder%"&lt;BR /&gt;blacklist5 = EventCode="6278" Message="Network Policy Server granted full access to a user because the host met the defined health policy."&lt;/P&gt;&lt;P&gt;#whitelist = 1101, 1104, 4616, 4657, 4697&lt;BR /&gt;sourcetype = WinEventLog:Security&lt;BR /&gt;index=uat&lt;/P&gt;&lt;P&gt;[WinEventLog://System]&lt;BR /&gt;disabled = 0&lt;BR /&gt;start_from = oldest&lt;BR /&gt;current_only = 0&lt;BR /&gt;checkpointInterval = 10&lt;BR /&gt;renderXml=true&lt;BR /&gt;sourcetype = WinEventLog:System&lt;BR /&gt;index=uat&lt;/P&gt;&lt;P&gt;[WinEventLog://Setup]&lt;BR /&gt;checkpointInterval = 10&lt;BR /&gt;current_only = 0&lt;BR /&gt;disabled = 0&lt;BR /&gt;start_from = oldest&lt;BR /&gt;renderXml=true&lt;BR /&gt;sourcetype = WinEventLog:Setup&lt;BR /&gt;index=uat&lt;/P&gt;&lt;P&gt;[monitor://$SPLUNK_HOME\var\log\splunk\*.log*]&lt;BR /&gt;sourcetype = uf&lt;BR /&gt;dissabled = 0&lt;BR /&gt;index = _internal&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2023 16:02:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655873#M111116</guid>
      <dc:creator>yr</dc:creator>
      <dc:date>2023-08-28T16:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655900#M111120</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;agreed but why source and sourcetype os mixed up ? it does not goes what i have mentioned in inputs.conf.&lt;/P&gt;&lt;P&gt;how do i fix it ?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;DC01&lt;/SPAN&gt;.xxx.xxx&lt;/SPAN&gt;&amp;lt;&lt;SPAN class=""&gt;/Computer&lt;/SPAN&gt;&amp;gt;&amp;lt;&lt;SPAN class=""&gt;Security/&lt;/SPAN&gt;&amp;gt;&amp;lt;&lt;SPAN class=""&gt;/System&lt;/SPAN&gt;&amp;gt;&amp;lt;&lt;SPAN class=""&gt;EventData&lt;/SPAN&gt;&amp;gt;&amp;lt;&lt;SPAN class=""&gt;Data&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name=&lt;/SPAN&gt;'&lt;SPAN class=""&gt;SubjectUserSid&lt;/SPAN&gt;'&amp;gt;&lt;SPAN class=""&gt;CORP\ADmaint&lt;/SPAN&gt;&amp;lt;&lt;SPAN class=""&gt;/Data&lt;/SPAN&gt;&amp;gt;&amp;lt;&lt;SPAN class=""&gt;Data&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name=&lt;/SPAN&gt;'&lt;SPAN class=""&gt;SubjectUserName&lt;/SPAN&gt;'&amp;gt;&lt;SPAN class=""&gt;ADmaint&lt;/SPAN&gt;&amp;lt;&lt;SPAN class=""&gt;/Data&lt;/SPAN&gt;&amp;gt;&amp;lt;&lt;SPAN class=""&gt;Data&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name=&lt;/SPAN&gt;'&lt;SPAN class=""&gt;SubjectDomainName&lt;/SPAN&gt;'&amp;gt;&lt;SPAN class=""&gt;CORP&lt;/SPAN&gt;&amp;lt;&lt;SPAN class=""&gt;/Data&lt;/SPAN&gt;&amp;gt;&amp;lt;&lt;SPAN class=""&gt;Data&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name=&lt;/SPAN&gt;'&lt;SPAN class=""&gt;SubjectLogonId&lt;/SPAN&gt;'&amp;gt;&lt;SPAN class=""&gt;0x1b73fc&lt;/SPAN&gt;&amp;lt;&lt;SPAN class=""&gt;/Data&lt;/SPAN&gt;&amp;gt;&amp;lt;&lt;SPAN class=""&gt;Data&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name=&lt;/SPAN&gt;'&lt;SPAN class=""&gt;PrivilegeList&lt;/SPAN&gt;'&amp;gt;&lt;SPAN class=""&gt;SeSecurityPrivilege&lt;/SPAN&gt; &lt;SPAN class=""&gt;SeBackupPrivilege&lt;/SPAN&gt; &lt;SPAN class=""&gt;SeRestorePrivilege&lt;/SPAN&gt; &lt;SPAN class=""&gt;SeTakeOwnershipPrivilege&lt;/SPAN&gt; &lt;SPAN class=""&gt;SeDebugPrivilege&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;SPAN class=""&gt;host =&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;DC01&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;source =&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;WinEventLog:Security&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;sourcetype =&amp;nbsp;WinEventLog&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN class=""&gt;this source and sourcetype are mixed and not according to inputs.conf&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 28 Aug 2023 22:50:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655900#M111120</guid>
      <dc:creator>yr</dc:creator>
      <dc:date>2023-08-28T22:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655908#M111123</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/256504"&gt;@yr&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;as I said, I don't know why, since some time Splunk changed approach using the same sourcetype for all WinEventLogs distinguishing them by source.&lt;/P&gt;&lt;P&gt;I saw that you forced sourcetype in each inputs stanza, in this way you should be sure to have the sourcetype you want, in this way you shouldn't miss any log.&lt;/P&gt;&lt;P&gt;I disagree with the last input stanza: Splunk logs are ingested in another input stanza and this is a duplication, in addition you forced sourcetype, in this way you're losing some internal monitoring features (e.g. Monitoring Console).&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 05:55:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655908#M111123</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-08-29T05:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655926#M111124</link>
      <description>&lt;P&gt;It needs a longer explanation. I believe long time ago the things were as you tried to set them up - the events were distinguishable by sourcetypes. But since there is no actual need to treat them as separate sourcetypes (sourcetype defines how the data is processed - ingested and parsed) because the data is in the same format regardless of which particular EventLog channel it came from and having separate sourcetypes for each EventLog&amp;nbsp; channel would mean that you'd need to define settings for each new channel you ingest (and you can pull any of the channels you see in your EventLog!).&lt;/P&gt;&lt;P&gt;So there was a shift in the approach to windows events (and it happened looooong time ago). And in order to accomodate all those forwarders installed long time ago and still working with old defaults (configured as you tried to set it up), there are transforms in TA_windows which "normalize" the sources and sourcetypes.&lt;/P&gt;&lt;P&gt;This is from default/transforms.conf:&lt;/P&gt;&lt;PRE&gt;## Setting generic sourcetype and unique source&lt;BR /&gt;[ta-windows-fix-classic-source]&lt;BR /&gt;DEST_KEY = MetaData:Source&lt;BR /&gt;REGEX = (?m)^LogName=(.+?)\s*$&lt;BR /&gt;FORMAT = source::WinEventLog:$1&lt;BR /&gt;&lt;BR /&gt;[ta-windows-fix-xml-source]&lt;BR /&gt;DEST_KEY = MetaData:Source&lt;BR /&gt;REGEX = &amp;lt;Channel&amp;gt;(.+?)&amp;lt;\/Channel&amp;gt;.*&lt;BR /&gt;FORMAT = source::XmlWinEventLog:$1&lt;BR /&gt;&lt;BR /&gt;[ta-windows-fix-sourcetype]&lt;BR /&gt;SOURCE_KEY = MetaData:Sourcetype&lt;BR /&gt;DEST_KEY = MetaData:Sourcetype&lt;BR /&gt;REGEX = sourcetype::([^:]*)&lt;BR /&gt;FORMAT = sourcetype::$1&lt;/PRE&gt;&lt;P&gt;Even if you explicitly configure your inputs to provide source and sourcetype "old style" the transforms will get invoked during indexing an will overwrite the metadata fields to the "new style".&lt;/P&gt;&lt;P&gt;So all windows EventLog-sourced events are of either WinEventLog sourcetype or XmlWinEvenLog one (depending on whether you ingest them as "classic" or XML).&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 08:14:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655926#M111124</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-08-29T08:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655994#M111129</link>
      <description>&lt;P&gt;Hi PickleRick,&lt;/P&gt;&lt;P&gt;Thank you for good research and shared the knowledge.&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can i fix this issue if you can please share more tips ?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 16:47:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/655994#M111129</guid>
      <dc:creator>yr</dc:creator>
      <dc:date>2023-08-29T16:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/656002#M111130</link>
      <description>&lt;P&gt;But why would you want to fix that? Just search by source if you want evetns from one event log channel.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 17:42:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/656002#M111130</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-08-29T17:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: Index, source and sourceType for splunk_ta_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/656019#M111131</link>
      <description>&lt;P&gt;Hi PickleRick,&lt;/P&gt;&lt;P&gt;Agreed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Than do i remove the sourcetype= statement from stanza in inputs.conf&amp;nbsp; ? ( becuase it is over written any way )&lt;/P&gt;&lt;P&gt;please share your thoughts.&lt;/P&gt;&lt;P&gt;also&amp;nbsp;&lt;/P&gt;&lt;P&gt;do i create seperate index for metrics mentioned in my inputs.conf of keep with eventtype index ?&lt;/P&gt;&lt;P&gt;here is snipped of inputs.conf&lt;/P&gt;&lt;P&gt;------------------------------- inputs.conf ----------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;###### OS Logs ######&lt;BR /&gt;#&lt;BR /&gt;[WinEventLog://Application]&lt;BR /&gt;disabled = false&lt;BR /&gt;start_from = oldest&lt;BR /&gt;current_only = 0&lt;BR /&gt;checkpointInterval = 5&lt;BR /&gt;renderXml=true&lt;BR /&gt;index = winos&lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;------&lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;#&lt;BR /&gt;###### Host monitoring ######&lt;BR /&gt;#&lt;/P&gt;&lt;P&gt;[WinHostMon://Computer]&lt;BR /&gt;interval = 600&lt;BR /&gt;disabled = false&lt;BR /&gt;type = Computer&lt;BR /&gt;index = winos&lt;/P&gt;&lt;P&gt;[WinHostMon://Process]&lt;BR /&gt;interval = 600&lt;BR /&gt;disabled = false&lt;BR /&gt;type = Process&lt;BR /&gt;index = winos&lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;#&lt;BR /&gt;###### Win Registry Monitoring&lt;BR /&gt;#&lt;/P&gt;&lt;P&gt;[WinRegMon://default]&lt;BR /&gt;disabled = false&lt;BR /&gt;hive = .*&lt;BR /&gt;proc = .*&lt;BR /&gt;type = rename|set|delete|create&lt;BR /&gt;index = winos&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;------&lt;/P&gt;&lt;P&gt;#&lt;BR /&gt;# perfmonance Monitoring&lt;BR /&gt;#&lt;/P&gt;&lt;P&gt;###### Splunk 5.0+ Performance Counters ######&lt;BR /&gt;## CPU&lt;BR /&gt;[perfmon://CPU]&lt;BR /&gt;counters = % Processor Time; % User Time; % Privileged Time; Interrupts/sec; % DPC Time; % Interrupt Time; DPCs Queued/sec; DPC Rate; % Idle Time; % C1 Time; % C2 Time; % C3 Time; C1 Transitions/sec; C2 Transitions/sec; C3 Transitions/sec&lt;BR /&gt;instances = *&lt;BR /&gt;interval = 30&lt;BR /&gt;mode = single&lt;BR /&gt;object = Processor&lt;BR /&gt;_meta = os::"Microsoft Windows Server 2012 R2 Standard" os_version::6.3.9600 entity_type::Windows_Host&lt;BR /&gt;useEnglishOnly = true&lt;BR /&gt;sourcetype = PerfmonMetrics:CPU&lt;BR /&gt;disabled = 0&lt;BR /&gt;index = ?????&lt;/P&gt;&lt;P&gt;Please share your expertise&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 22:10:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-ta-windows-Why-are-Index-source-and-sourceType-missing/m-p/656019#M111131</guid>
      <dc:creator>yr</dc:creator>
      <dc:date>2023-08-29T22:10:49Z</dc:date>
    </item>
  </channel>
</rss>

