<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows Events Not showing Up on Indexer in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Not-showing-Up-on-Indexer/m-p/363449#M66223</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;

&lt;P&gt;How have you determined that the events are being sent to the indexer?&lt;/P&gt;

&lt;P&gt;Could it be that the date format of the events is being misinterpreted and the events indexed today from the Domain Controllers are being indexed with a timestamp of 10 February 2017?  &lt;/P&gt;

&lt;P&gt;Dave&lt;/P&gt;</description>
    <pubDate>Mon, 02 Oct 2017 15:39:58 GMT</pubDate>
    <dc:creator>davebrooking</dc:creator>
    <dc:date>2017-10-02T15:39:58Z</dc:date>
    <item>
      <title>Windows Events Not showing Up on Indexer</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Not-showing-Up-on-Indexer/m-p/363448#M66222</link>
      <description>&lt;P&gt;A UF was installed on 2 Windows domain Controllers. These are in a different windows forest than my other devices. I had to manually add these to the windows_eventlog class by IP as the DNS name can't be resolved. I now see them sending to the indexer but I can't search any of the events. How can I trouble shoot this?&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 02 Oct 2017 13:22:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Not-showing-Up-on-Indexer/m-p/363448#M66222</guid>
      <dc:creator>pfabrizi</dc:creator>
      <dc:date>2017-10-02T13:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Not showing Up on Indexer</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Not-showing-Up-on-Indexer/m-p/363449#M66223</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;

&lt;P&gt;How have you determined that the events are being sent to the indexer?&lt;/P&gt;

&lt;P&gt;Could it be that the date format of the events is being misinterpreted and the events indexed today from the Domain Controllers are being indexed with a timestamp of 10 February 2017?  &lt;/P&gt;

&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Mon, 02 Oct 2017 15:39:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Not-showing-Up-on-Indexer/m-p/363449#M66223</guid>
      <dc:creator>davebrooking</dc:creator>
      <dc:date>2017-10-02T15:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Not showing Up on Indexer</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Not-showing-Up-on-Indexer/m-p/363450#M66224</link>
      <description>&lt;P&gt;I will check for that, It appears that I have to use the IP address and I had to manually add them to the server class on my deployment server. If I tried by DNS name the apps for the windows server class was not added, however when I added the IP they got configured. I have not had to do that with any other servers that I am aware of.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Oct 2017 12:42:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Not-showing-Up-on-Indexer/m-p/363450#M66224</guid>
      <dc:creator>pfabrizi</dc:creator>
      <dc:date>2017-10-03T12:42:39Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Events Not showing Up on Indexer</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Not-showing-Up-on-Indexer/m-p/363451#M66225</link>
      <description>&lt;P&gt;You could read the metrics.log &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Troubleshooting/Aboutmetricslog"&gt;(documentation here)&lt;/A&gt; of the universal forwarder, the series= lines should advise which index, sourcetype and source the data was going through the forwarder.&lt;BR /&gt;
The metrics.log/splunkd.log should confirm that the forwarder is forwarding as expected.&lt;/P&gt;

&lt;P&gt;The tstats command might also help here, for example you could do:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats count, max(_indextime) AS mostRecent, max(_time) AS mostRecentParsedTime where index=windows groupby host | eval mostRecent = strftime(mostRecent, "%+"), mostRecentParsedTime = strftime(mostRecentParsedTime, "%+")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You could then narrow down to an index/sourcetype/source or similar and include/exclude hosts until you narrow down to where your hosts are, perhaps they used IP instead of DNS name?&lt;BR /&gt;
Since &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Tstats"&gt;tstats&lt;/A&gt; queries metadata only it is quite quick to run over larger periods of time, however you can only use the where clause against indexed fields...&lt;/P&gt;

&lt;P&gt;Finally, if you can see data leaving the forwarder but you are unsure where it's going run the &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Troubleshooting/Usebtooltotroubleshootconfigurations"&gt;btool command&lt;/A&gt;:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;splunk btool outputs list --debug
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 04 Oct 2017 12:06:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Events-Not-showing-Up-on-Indexer/m-p/363451#M66225</guid>
      <dc:creator>gjanders</dc:creator>
      <dc:date>2017-10-04T12:06:25Z</dc:date>
    </item>
  </channel>
</rss>

