<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Search not producing event types in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-not-producing-event-types/m-p/441481#M125415</link>
    <description>&lt;P&gt;Hello. I am trying to get interactive logon logs for all workstations in an organization. The event code for this log is 4624 with the Event Type 2. I am only seeing Event Type 0 in Splunk when I do a search. When I view the logs in Event Viewer on a test workstation I am seeing all the Logon Types. I have been searching a lot for answers and have tried every solution but none of them give me the results I need.&lt;/P&gt;

&lt;P&gt;What I have done:&lt;BR /&gt;
1.) Confirmed that the event log collections for security logs is enabled with the wineventlog index in Data Inputs on the Deployment Server. &lt;BR /&gt;
2.) I created a whitelist in the local directory of that app for the inputs.conf file with the following format:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 0
whitelist = EventCode="4624" Message="LogonType=2"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;also tried this,&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 0
whitelist = EventCode="4624"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I  created a REGEX in the local directory of that app for the transforms.conf file with the following format:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;REGEX = (?msi)EventCode=4624.&amp;lt;em&amp;gt;Logon Type:\s&amp;lt;/em&amp;gt;(2|10)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Tue, 25 Jun 2019 15:05:55 GMT</pubDate>
    <dc:creator>insomniacnerd94</dc:creator>
    <dc:date>2019-06-25T15:05:55Z</dc:date>
    <item>
      <title>Search not producing event types</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-not-producing-event-types/m-p/441481#M125415</link>
      <description>&lt;P&gt;Hello. I am trying to get interactive logon logs for all workstations in an organization. The event code for this log is 4624 with the Event Type 2. I am only seeing Event Type 0 in Splunk when I do a search. When I view the logs in Event Viewer on a test workstation I am seeing all the Logon Types. I have been searching a lot for answers and have tried every solution but none of them give me the results I need.&lt;/P&gt;

&lt;P&gt;What I have done:&lt;BR /&gt;
1.) Confirmed that the event log collections for security logs is enabled with the wineventlog index in Data Inputs on the Deployment Server. &lt;BR /&gt;
2.) I created a whitelist in the local directory of that app for the inputs.conf file with the following format:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 0
whitelist = EventCode="4624" Message="LogonType=2"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;also tried this,&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 0
whitelist = EventCode="4624"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I  created a REGEX in the local directory of that app for the transforms.conf file with the following format:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;REGEX = (?msi)EventCode=4624.&amp;lt;em&amp;gt;Logon Type:\s&amp;lt;/em&amp;gt;(2|10)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 25 Jun 2019 15:05:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-not-producing-event-types/m-p/441481#M125415</guid>
      <dc:creator>insomniacnerd94</dc:creator>
      <dc:date>2019-06-25T15:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: Search not producing event types</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-not-producing-event-types/m-p/441482#M125416</link>
      <description>&lt;P&gt;I assume when you refer to "that app", you're referring to the Splunk TA for Windows. Try setting your inputs.conf whitelist to:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;whitelist = EventCode="4624" Message="Logon Type:\s+2"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm not sure what you're trying to do with the transforms - the Windows TA should parse the logon type field to "Logon_Type".  &lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2019 16:07:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-not-producing-event-types/m-p/441482#M125416</guid>
      <dc:creator>wenthold</dc:creator>
      <dc:date>2019-06-25T16:07:08Z</dc:date>
    </item>
    <item>
      <title>Re: Search not producing event types</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-not-producing-event-types/m-p/441483#M125417</link>
      <description>&lt;P&gt;Thank you. That seems to have fixed the issue.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2019 16:35:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-not-producing-event-types/m-p/441483#M125417</guid>
      <dc:creator>insomniacnerd94</dc:creator>
      <dc:date>2019-06-25T16:35:46Z</dc:date>
    </item>
  </channel>
</rss>

