Getting Data In

How to capture all entries in Windows Security Logs at first run

nswcowboy
New Member

hi All,

I've setup a heavy forwarder on Server B, and forward the entries in Windows Security log to Server A (Indexer).

I configured the inputs.conf on Server B, let say at 9 AM in the morning, the entries are forwarded and indexed successfully. However, seems like it is only captures data from 9 AM onward and not including older entries.

The content of inputs.conf:

[default]

host = hostname.com

[WinEventLog:Security]

disabled = 0

index = security_index

current_only = 0

start_from = oldest

Am I missing something here?

Thank you

Tags (1)
0 Karma

yannK
Splunk Employee
Splunk Employee

All looks fine. make sure that your wineventslog were present.

0 Karma

kmcconnell
Path Finder

Did you figure this out? The exact same thing is happening to me.

0 Karma

nswcowboy
New Member

the Logs were there and I could see the entries way back before the creation of the input.conf file.
So, I can't figure out why it only pick up entries after 9 AM.

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...