<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Too many Events generated for Windows Security EventCode 4662 causing high resource issues like CPU in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Too-many-Events-generated-for-Windows-Security-EventCode-4662/m-p/155262#M31539</link>
    <description>&lt;P&gt;The splunk service user seems to be reading the Active Directory's "Deleted Object Container" as frequent as 60 times per second. &lt;/P&gt;

&lt;P&gt;Every time this container is accessed, it generates Windows Security audit logs; thus increasing the volume and frequency of Windows Security logs that the Universal Forwarder  has to forward for indexing. We suspect this is the cause of the issue to spiral. Also, because of the increased log volume, the Security logs now rolls every 5 hours, instead of a few   also we see high resource utaliation due to &lt;/P&gt;</description>
    <pubDate>Tue, 09 Dec 2014 23:53:48 GMT</pubDate>
    <dc:creator>sat94541</dc:creator>
    <dc:date>2014-12-09T23:53:48Z</dc:date>
    <item>
      <title>Too many Events generated for Windows Security EventCode 4662 causing high resource issues like CPU</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Too-many-Events-generated-for-Windows-Security-EventCode-4662/m-p/155262#M31539</link>
      <description>&lt;P&gt;The splunk service user seems to be reading the Active Directory's "Deleted Object Container" as frequent as 60 times per second. &lt;/P&gt;

&lt;P&gt;Every time this container is accessed, it generates Windows Security audit logs; thus increasing the volume and frequency of Windows Security logs that the Universal Forwarder  has to forward for indexing. We suspect this is the cause of the issue to spiral. Also, because of the increased log volume, the Security logs now rolls every 5 hours, instead of a few   also we see high resource utaliation due to &lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2014 23:53:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Too-many-Events-generated-for-Windows-Security-EventCode-4662/m-p/155262#M31539</guid>
      <dc:creator>sat94541</dc:creator>
      <dc:date>2014-12-09T23:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: Too many Events generated for Windows Security EventCode 4662 causing high resource issues like CPU</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Too-many-Events-generated-for-Windows-Security-EventCode-4662/m-p/155263#M31540</link>
      <description>&lt;OL&gt;
&lt;LI&gt;At some point, unknown root cause, the service account that the SplunkForwarder runs under began accessing the Directory Service object: CN=Deleted Objects,DC=DomainDnsZones,DC=global,DC=scj,DC=loc

&lt;OL&gt;
&lt;LI&gt;This object does not exist.&lt;/LI&gt;
&lt;LI&gt;DS Access auditing was enabled on the domain controllers.&lt;/LI&gt;
&lt;LI&gt;This caused the object access to record a 4662 event in the event log.&lt;/LI&gt;
&lt;LI&gt;The service account was reading this object dozens of times per second according to the event log.&lt;/LI&gt;
&lt;LI&gt;The security event log on the DC was configured to roll over at 4GB size which at its shortest only held 5.5 hours of data in the 4GB of size.&lt;/LI&gt;
&lt;LI&gt;Hence, the events in Splunk were no newer than 5.5 hours because the security log was filling faster than the forwarder could send and index the events.&lt;/LI&gt;
&lt;LI&gt;Since Splunk instance is set to dump event 4662 to a null queue so it was not indexed.&lt;/LI&gt;
&lt;LI&gt;DS Access object auditing was disabled and event 4662 stopped being logged.&lt;/LI&gt;
&lt;LI&gt;Within 12 hours the forwarder caught up to the event log.&lt;/LI&gt;
&lt;LI&gt;DS Access object auditing was enabled again. NO 4662 events are occurring. Somewhere along the way the forwarder decided to stop attempting to access that object.&lt;/LI&gt;
&lt;/OL&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 09 Dec 2014 23:56:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Too-many-Events-generated-for-Windows-Security-EventCode-4662/m-p/155263#M31540</guid>
      <dc:creator>rbal_splunk</dc:creator>
      <dc:date>2014-12-09T23:56:15Z</dc:date>
    </item>
  </channel>
</rss>

