<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I search the aggregated event logs of our Splunk servers? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-the-aggregated-event-logs-of-our-Splunk-servers/m-p/602006#M209528</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/232137"&gt;@Gregski11&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;at first check for new versions of this TA,&lt;/P&gt;&lt;P&gt;but anyway, using the TA_Windows it's possible to take many other types of data starting from WinEventLog, check the inputs.conf file on each Splunk Server to see which inputs are enabled.&lt;/P&gt;&lt;P&gt;When you enable these inputs and you enabled forwarding, you'll have in Indexers all logs from all Splunk Servers.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jun 2022 06:16:05 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2022-06-16T06:16:05Z</dc:date>
    <item>
      <title>How do I search the aggregated event logs of our Splunk servers?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-the-aggregated-event-logs-of-our-Splunk-servers/m-p/601838#M209457</link>
      <description>&lt;P&gt;I recently learned that it is best practice to use the Monitoring Console to manage our Splunk servers instead of installing Universal Forwarders on them, how then do we run a search across all of our Splunk servers Event Logs to for instance see how long each one was up for?&amp;nbsp; I have the query and I can run it against all of our other servers that do have the Universal Forwarder installed on them and it works great, but when I query the wineventlog index it finds none of our Splunk servers in it&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 07:10:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-the-aggregated-event-logs-of-our-Splunk-servers/m-p/601838#M209457</guid>
      <dc:creator>Gregski11</dc:creator>
      <dc:date>2022-06-15T07:10:20Z</dc:date>
    </item>
    <item>
      <title>Re: How do I search the aggregated event logs of our Splunk servers?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-the-aggregated-event-logs-of-our-Splunk-servers/m-p/601853#M209465</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/232137"&gt;@Gregski11&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;each Splunk Enterprise installation has the feature to forward logs, so as you can forwardr internal logs as I described in my previous answer.&lt;/P&gt;&lt;P&gt;At the same time you can install the same TAs (e.g. the Splunk_TA_Windows) to take all local logs and send them (with the same forwarding configuration) to Indexers.&lt;/P&gt;&lt;P&gt;In other words: you don't need a Forwarder on a Splunk Enterprise server because it already has this feature; you have to manage log ingestion on them as Forwarders, using TAs (better) or enabling local inputs (I don't like this!).&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 08:12:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-the-aggregated-event-logs-of-our-Splunk-servers/m-p/601853#M209465</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-06-15T08:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: How do I search the aggregated event logs of our Splunk servers?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-the-aggregated-event-logs-of-our-Splunk-servers/m-p/601932#M209504</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/232137"&gt;@Gregski11&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;each Splunk Enterprise installation has the feature to forward logs, so as you can forwardr internal logs as I described in my previous answer.&lt;/P&gt;&lt;P&gt;At the same time you can install the same TAs (e.g. the Splunk_TA_Windows) to take all local logs and send them (with the same forwarding configuration) to Indexers.&lt;/P&gt;&lt;P&gt;In other words: you don't need a Forwarder on a Splunk Enterprise server because it already has this feature; you have to manage log ingestion on them as Forwarders, using TAs (better) or enabling local inputs (I don't like this!).&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;thank you so much&amp;nbsp;&lt;SPAN&gt;Giuseppe, it appears we do have the&amp;nbsp;Splunk Add-on for Microsoft Windows version 7.0.0 already installed and enabled on our Search Heads (it's not made visible though, but I don't think that matters) I do not see it on our other Splunk servers but they have apps called&amp;nbsp;SplunkForwarder and&amp;nbsp; SplunkLightForwarder I wonder what those apps do on those servers&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 15:20:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-the-aggregated-event-logs-of-our-Splunk-servers/m-p/601932#M209504</guid>
      <dc:creator>Gregski11</dc:creator>
      <dc:date>2022-06-15T15:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: How do I search the aggregated event logs of our Splunk servers?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-the-aggregated-event-logs-of-our-Splunk-servers/m-p/601984#M209519</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/232137"&gt;@Gregski11&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;each Splunk Enterprise installation has the feature to forward logs, so as you can forwardr internal logs as I described in my previous answer.&lt;/P&gt;&lt;P&gt;At the same time you can install the same TAs (e.g. the Splunk_TA_Windows) to take all local logs and send them (with the same forwarding configuration) to Indexers.&lt;/P&gt;&lt;P&gt;In other words: you don't need a Forwarder on a Splunk Enterprise server because it already has this feature; you have to manage log ingestion on them as Forwarders, using TAs (better) or enabling local inputs (I don't like this!).&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Looks like the&amp;nbsp;Splunk Add-on for Windows does not collect Event Logs:&lt;BR /&gt;&lt;BR /&gt;The Splunk Add-on for Windows allows a Splunk software administrator to collect:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class=""&gt;CPU, disk, I/O, memory, log, configuration, and user data with data inputs.&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;Active Directory and Domain Name Server debug logs from Windows hosts that act as domain controllers for a supported version of a Windows Server. You must configure Active Directory audit policy since Active Directory does not log certain events by default.&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;Domain Name Server debug logs from Windows hosts that run a Windows DNS Server. Windows DNS Server does not log certain events by default, and you must enable debug logging.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://docs.splunk.com/Documentation/AddOns/released/Windows/AbouttheSplunkAdd-onforWindows" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/AddOns/released/Windows/AbouttheSplunkAdd-onforWindows&lt;/A&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 21:34:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-the-aggregated-event-logs-of-our-Splunk-servers/m-p/601984#M209519</guid>
      <dc:creator>Gregski11</dc:creator>
      <dc:date>2022-06-15T21:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: How do I search the aggregated event logs of our Splunk servers?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-the-aggregated-event-logs-of-our-Splunk-servers/m-p/602006#M209528</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/232137"&gt;@Gregski11&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;at first check for new versions of this TA,&lt;/P&gt;&lt;P&gt;but anyway, using the TA_Windows it's possible to take many other types of data starting from WinEventLog, check the inputs.conf file on each Splunk Server to see which inputs are enabled.&lt;/P&gt;&lt;P&gt;When you enable these inputs and you enabled forwarding, you'll have in Indexers all logs from all Splunk Servers.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2022 06:16:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-the-aggregated-event-logs-of-our-Splunk-servers/m-p/602006#M209528</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-06-16T06:16:05Z</dc:date>
    </item>
  </channel>
</rss>

