All Apps and Add-ons

Can't disable windows event collection

grantcasey
Engager

I installed the Windows app and updated to 4.2.3 and now I can't disable any of the local event logs it is collecting - which in my case is taking up 500MB + of data a day per machine.
Any way around this? What is indexing it behind my back? I have disabled local event log collection from the Data Inputs menu, but they just keep indexing anyway...

0 Karma

grantcasey
Engager

I had to uninstall the Windows app from my splunk instance.

0 Karma

araitz
Splunk Employee
Splunk Employee

It could be that the version of the app you are using uses WMI to index the local event logs by default. Disabling the WMI inputs via Manager or wmi.conf might do the trick.

slierninja
Communicator

My universial forwarder setup the inputs.conf in the Program Files\SplunkUniversalForwarder\etc\apps\MSICreated\local path.

0 Karma

dmaislin_splunk
Splunk Employee
Splunk Employee

Did you check all the boxes when you installed the forwarder? If so, go to the remote machine into where Splunk is installed into etc/apps. Go to the msicreated/local and see if you have inputs.conf, perfmon.conf, and wmi.conf. if you remove them and restart the forwarder it should stop. They may also be in etc/system/local too.

richnavis
Contributor

I have the same problem for remote event logs. Disabled collection, but they continue to collect.

0 Karma
Get Updates on the Splunk Community!

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...