All Apps and Add-ons

Windows NPS Logfile not monitored

StefanW
Path Finder

Hello,

i want to log my windows nps (network protection server or radius) to splunk. I found this thread. https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-parse-Radius-log-files-into-splunk-What-...

But my data is not forwarded to my splunk server. I installed the universal forwarder on the radius server and deployed the default windows app. My windows eventlogs are forwarded from the radius to the splunk server. But not das Radius Log file.

I created an app with inputs.conf and pros.conf like in the thread above.

The inputs.conf file

 

[monitor://C:\Windows\System32\LogFiles]
sourcetype = ias
index = radius
disabled = 0
whitelist=IN.*\.log
alwaysOpenFile=1

 

 

How can i find out, why the data is not forwarded ?

Labels (1)

StefanW
Path Finder

i found my mistake. I wrote in my inputs.log the sourcetype=ias. But i have not deployed the app with the same inputs.conf to my search head. so splunk cannot show the entries. Strange... but ok.

After copying the app to my searchhead/indexer i see the log entrys.

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...