All Apps and Add-ons

Windows Event Logs Analysis - parsing of the logs is not what it is expecting

cisaksen
Explorer

Is anyone having trouble with evenitid add-on working with Splunk_TA_windows add-on?

The Windows logs are being parsed and in a nice readable format but eventid seems to be expecting something different than what is being parsed. I'm getting results that don't match what I believe eventid is expecting.
example:
On the EventSources dashboard the Event Sources panel returns nothing for Error - All - * in the imput fileds. But if do a manual search just based on Type I get the following types (event_sources| stats count by Type)
Computer

OperatingSystem
Processor

Roles

Site

SiteLink

Subnet

This clearly doesn't seem to be what eventid is looking for. Any ideas on what could be happening ?

0 Karma
Get Updates on the Splunk Community!

SOCin’ it to you at Splunk University

Splunk University is expanding its instructor-led learning portfolio with dedicated Security tracks at .conf25 ...

Credit Card Data Protection & PCI Compliance with Splunk Edge Processor

Organizations handling credit card transactions know that PCI DSS compliance is both critical and complex. The ...

Stay Connected: Your Guide to July Tech Talks, Office Hours, and Webinars!

What are Community Office Hours?Community Office Hours is an interactive 60-minute Zoom series where ...