<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Failed to find Windows Event Log in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/578881#M201749</link>
    <description>&lt;P&gt;Yes, your stanza name is too long. Loose the first part.&lt;/P&gt;&lt;P&gt;You can verify it with powershell&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-eventlog?view=powershell-5.1" target="_blank"&gt;https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-eventlog?view=powershell-5.1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Check with what -LogName value you'll get results. It's way easier than blindly (re)configuring splunk inputs/&lt;/P&gt;</description>
    <pubDate>Mon, 20 Dec 2021 08:19:43 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2021-12-20T08:19:43Z</dc:date>
    <item>
      <title>Failed to find Windows Event Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/577225#M201151</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;I'm trying to injest event from this Microsoft event viewer:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog://Microsoft-Windows-TerminalServices-ClientActiveXCore/Microsoft-Windows-TerminalServices-RDPClient/Operational]
disabled = 0
renderXml = 1
sourcetype = XmlWinEventLog
index = ad&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My issue is, that the name of&amp;nbsp; the event log the whole path is and not just "Operational" like the others.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="g_paternicola_0-1638539638450.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/17111i0B9B5E3BD4EF4EDD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="g_paternicola_0-1638539638450.png" alt="g_paternicola_0-1638539638450.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because of that I will get an error in Splunk:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;ERROR ExecProcessor [5076 ExecProcessor] - message from ""C:\Program Files\SplunkUniversalForwarder\bin\splunk-winevtlog.exe"" splunk-winevtlog - WinEventMon::configure: Failed to find Event Log with channel name='Microsoft-Windows-TerminalServices-ClientActiveXCore/Microsoft-Windows-TerminalServices-RDPClient/Operational'&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to escape the "/" before Operational?&lt;/P&gt;&lt;P&gt;Thank you very much in advice.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 13:56:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/577225#M201151</guid>
      <dc:creator>g_paternicola</dc:creator>
      <dc:date>2021-12-03T13:56:07Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to find Windows Event Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/577253#M201159</link>
      <description>&lt;P&gt;The escape character is '\'.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 16:55:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/577253#M201159</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-12-03T16:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to find Windows Event Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/577254#M201160</link>
      <description>&lt;P&gt;Already tried, but it didn't work.. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 16:57:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/577254#M201160</guid>
      <dc:creator>g_paternicola</dc:creator>
      <dc:date>2021-12-03T16:57:24Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to find Windows Event Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/578872#M201746</link>
      <description>&lt;P&gt;Is there anyone else that can help me, please?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 07:38:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/578872#M201746</guid>
      <dc:creator>g_paternicola</dc:creator>
      <dc:date>2021-12-20T07:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to find Windows Event Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/578876#M201747</link>
      <description>&lt;P&gt;You need this value as channel name&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_20211220-091242_Client.jpg" style="width: 1268px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/17301iCD6FBBC2B111895A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_20211220-091242_Client.jpg" alt="Screenshot_20211220-091242_Client.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 08:13:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/578876#M201747</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2021-12-20T08:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to find Windows Event Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/578879#M201748</link>
      <description>&lt;P&gt;I already have this in my stanza:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog://Microsoft-Windows-TerminalServices-ClientActiveXCore/Microsoft-Windows-TerminalServices-RDPClient/Operational]
disabled = 0
renderXml = 1
sourcetype = XmlWinEventLog
index = ad
whitelist3=1024&lt;/LI-CODE&gt;&lt;P&gt;But I always going to get this error, even if I put the '\' escape before "Operational" or after&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;12-20-2021 09:08:21.416 +0100 ERROR ExecProcessor [21652 ExecProcessor] - message from ""C:\Program Files\SplunkUniversalForwarder\bin\splunk-winevtlog.exe"" splunk-winevtlog - WinEventMon::configure: Failed to find Event Log with channel name='Microsoft-Windows-TerminalServices-ClientActiveXCore/Microsoft-Windows-TerminalServices-RDPClient/Operational'&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 08:17:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/578879#M201748</guid>
      <dc:creator>g_paternicola</dc:creator>
      <dc:date>2021-12-20T08:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to find Windows Event Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/578881#M201749</link>
      <description>&lt;P&gt;Yes, your stanza name is too long. Loose the first part.&lt;/P&gt;&lt;P&gt;You can verify it with powershell&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-eventlog?view=powershell-5.1" target="_blank"&gt;https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-eventlog?view=powershell-5.1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Check with what -LogName value you'll get results. It's way easier than blindly (re)configuring splunk inputs/&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 08:19:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/578881#M201749</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2021-12-20T08:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to find Windows Event Log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/578884#M201751</link>
      <description>&lt;P&gt;this command was my solution:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Get-WinEvent -FilterHashTable @{ LogName = "Microsoft-Windows-TerminalServices-RDPClient/Operational"; ID = 1024 }&lt;/LI-CODE&gt;&lt;P&gt;There is no "TerminalServices-ClientActiveXCore" in the PowerShell results. This also why Splunk told me all the time "failed to find ...." Thank you!&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 08:47:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-to-find-Windows-Event-Log/m-p/578884#M201751</guid>
      <dc:creator>g_paternicola</dc:creator>
      <dc:date>2021-12-20T08:47:46Z</dc:date>
    </item>
  </channel>
</rss>

