All Apps and Add-ons

Windows Event Logs Analysis - parsing of the logs is not what it is expecting

cisaksen
Explorer

Is anyone having trouble with evenitid add-on working with Splunk_TA_windows add-on?

The Windows logs are being parsed and in a nice readable format but eventid seems to be expecting something different than what is being parsed. I'm getting results that don't match what I believe eventid is expecting.
example:
On the EventSources dashboard the Event Sources panel returns nothing for Error - All - * in the imput fileds. But if do a manual search just based on Type I get the following types (event_sources| stats count by Type)
Computer

OperatingSystem
Processor

Roles

Site

SiteLink

Subnet

This clearly doesn't seem to be what eventid is looking for. Any ideas on what could be happening ?

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In September, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...

New in Observability - Improvements to Custom Metrics SLOs, Log Observer Connect & ...

The latest enhancements to the Splunk observability portfolio deliver improved SLO management accuracy, better ...

Improve Data Pipelines Using Splunk Data Management

  Register Now   This Tech Talk will explore the pipeline management offerings Edge Processor and Ingest ...