All Apps and Add-ons

Windows Event Logs Analysis - parsing of the logs is not what it is expecting

cisaksen
Explorer

Is anyone having trouble with evenitid add-on working with Splunk_TA_windows add-on?

The Windows logs are being parsed and in a nice readable format but eventid seems to be expecting something different than what is being parsed. I'm getting results that don't match what I believe eventid is expecting.
example:
On the EventSources dashboard the Event Sources panel returns nothing for Error - All - * in the imput fileds. But if do a manual search just based on Type I get the following types (event_sources| stats count by Type)
Computer

OperatingSystem
Processor

Roles

Site

SiteLink

Subnet

This clearly doesn't seem to be what eventid is looking for. Any ideas on what could be happening ?

0 Karma
Get Updates on the Splunk Community!

Blueprints for High-Maturity Operations: Splunk Lantern Articles on SOAR, ES 8.4, ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...

Simplifying the Analyst Experience with Finding-based Detections

    Splunk invites you to an engaging Tech Talk focused on streamlining security operations with ...

[Puzzles] Solve, Learn, Repeat: Word Search

This challenge was first posted on Slack #puzzles channelThis puzzle is based on a letter grid containing ...