Getting Data In

After adding data from Windows event logs, why am I getting only one event from one source?

rajuljain1990
Explorer

After adding data from Windows event logs (system, security, application, setup), I only got one event for yesterday's date and only from one source "security log". Why is this and how should I troubleshoot the problem?

0 Karma

rsolutions
Path Finder

Have you tried searching all of the indexes:

index=*

By default the Windows TA's log to a wineventlog index. Only the main index is searched by default (unless you change it in the roles).

0 Karma

bkondakindi
Path Finder

check on forwarder side there might be duplicate inputs.conf file that is sending data.
we had similar issues so find all inputs.conf on UF side and verify it.

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...