<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows EventLog details - Exchange Management Log in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Windows-EventLog-details-Exchange-Management-Log/m-p/49503#M96761</link>
    <description>&lt;P&gt;And be sure to check out the PowerShell add-on, it lets you paste a PowerShell script into inputs.conf if you want. &lt;A href="http://apps.splunk.com/app/1477"&gt;http://apps.splunk.com/app/1477&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Sep 2013 18:10:02 GMT</pubDate>
    <dc:creator>halr9000</dc:creator>
    <dc:date>2013-09-09T18:10:02Z</dc:date>
    <item>
      <title>Windows EventLog details - Exchange Management Log</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-EventLog-details-Exchange-Management-Log/m-p/49500#M96758</link>
      <description>&lt;P&gt;In Server 2008 and above the Windows Event Log has a general tab and a details tab.&lt;BR /&gt;
Splunk is great at polling and indexing the general tab but the Details tab, whether the Friendly view or the XML view also has data that is critical to troubleshooting.&lt;/P&gt;

&lt;P&gt;My case in point:&lt;BR /&gt;
Exchange 2010 event log WinEventLog:MSExchange Management is being polled and indexed.  An event looks like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;20121128102958.000000
Category=1
CategoryString=General
EventCode=6
EventIdentifier=-1073741818
EventType=1
Logfile=MSExchange Management
RecordNumber=428075
SourceName=MSExchange CmdletLogs
TimeGenerated=20121128162958.000000-000
TimeWritten=20121128162958.000000-000
Type=Error
User=NULL
ComputerName=EXCHANGESERVER.DOMAIN.COM
wmi_type=WinEventLog:MSExchange Management
Message=Cmdlet failed. Cmdlet Add-DistributionGroupMember, parameters {Identity="GUID=big-long-serial-number", Member="distinguishedName of user", Confirm=False}.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The error message that the Cmdlet failed is not specific enough.&lt;BR /&gt;
In the details tab this same event may have many different reasons.  Here are two:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Microsoft.Exchange.Management.Tasks.MemberAlreadyExistsException: The recipient "distinguishedName of user" is already a member of the group "distinguishedName of distribution group".

Microsoft.Exchange.Data.Directory.ADScopeException: "distinguishedName of distribution group" isn't within your current write scopes. Can't perform save operation. 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Similar event, two different reasons. One reason requires attention, the other can be ignored.&lt;/P&gt;

&lt;P&gt;So my question is how can Splunk index this detail data behind the general event information?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2012 18:28:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-EventLog-details-Exchange-Management-Log/m-p/49500#M96758</guid>
      <dc:creator>pcjunkie</dc:creator>
      <dc:date>2012-11-29T18:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: Windows EventLog details - Exchange Management Log</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-EventLog-details-Exchange-Management-Log/m-p/49501#M96759</link>
      <description>&lt;P&gt;So after some asking around it appears that the Splunk event reader engine cannot get the detail I'm looking for.&lt;BR /&gt;&lt;BR /&gt;
I will be opening a feature request to see if this can be added to a future release.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Dec 2012 15:13:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-EventLog-details-Exchange-Management-Log/m-p/49501#M96759</guid>
      <dc:creator>pcjunkie</dc:creator>
      <dc:date>2012-12-05T15:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: Windows EventLog details - Exchange Management Log</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-EventLog-details-Exchange-Management-Log/m-p/49502#M96760</link>
      <description>&lt;P&gt;As a workaround to the point that @pcjunkie made, you could get the data another way. I would play with the Get-WinEvent cmdlet, and the resulting Properties property. I &lt;EM&gt;think&lt;/EM&gt; that's where the details go, but am not 100% certain.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;PS C:\Users\hrottenberg&amp;gt; Get-WinEvent -LogName "Microsoft-Windows-TaskScheduler/Operational" -MaxEvents 1 | fl *


Message              : Task Scheduler shutdown Task Engine
                       "S-1-5-21-1559891614-3024993685-3922480044-1000:LAB-WIN-SVR-1\hrottenberg:Interactive:LUA[1]"
                       process.
Id                   : 318
Version              : 0
Qualifiers           :
Level                : 4
Task                 : 318
Opcode               : 2
Keywords             : -9223372036854775808
RecordId             : 207793
ProviderName         : Microsoft-Windows-TaskScheduler
ProviderId           : de7b24ea-73c8-4a09-985d-5bdadcfa9017
LogName              : Microsoft-Windows-TaskScheduler/Operational
ProcessId            : 880
ThreadId             : 2708
MachineName          : lab-win-svr-1.bd.splunk.com
UserId               : S-1-5-18
TimeCreated          : 9/9/2013 1:49:01 PM
ActivityId           :
RelatedActivityId    :
ContainerLog         : microsoft-windows-taskscheduler/operational
MatchedQueryIds      : {}
Bookmark             : System.Diagnostics.Eventing.Reader.EventBookmark
LevelDisplayName     : Information
OpcodeDisplayName    : Stop
TaskDisplayName      : Task engine properly shut down
KeywordsDisplayNames : {}
Properties           : {System.Diagnostics.Eventing.Reader.EventProperty}



PS C:\Users\hrottenberg&amp;gt; Get-WinEvent -LogName "Microsoft-Windows-TaskScheduler/Operational" -MaxEvents 1 | select -ExpandProperty properties

Value
-----
S-1-5-21-1559891614-3024993685-3922480044-1000:LAB-WIN-SVR-1\hrottenberg:Interactive:LUA[1]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 09 Sep 2013 18:03:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-EventLog-details-Exchange-Management-Log/m-p/49502#M96760</guid>
      <dc:creator>halr9000</dc:creator>
      <dc:date>2013-09-09T18:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: Windows EventLog details - Exchange Management Log</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-EventLog-details-Exchange-Management-Log/m-p/49503#M96761</link>
      <description>&lt;P&gt;And be sure to check out the PowerShell add-on, it lets you paste a PowerShell script into inputs.conf if you want. &lt;A href="http://apps.splunk.com/app/1477"&gt;http://apps.splunk.com/app/1477&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2013 18:10:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-EventLog-details-Exchange-Management-Log/m-p/49503#M96761</guid>
      <dc:creator>halr9000</dc:creator>
      <dc:date>2013-09-09T18:10:02Z</dc:date>
    </item>
  </channel>
</rss>

