Getting Data In

How to onboard Windows Key Management Service logs to Splunk?

Loves-to-Learn Lots

Hi Splunker,

We are already onboarding Windows Event logs to Splunk, and with that now we also want to onboard windows Key Management Service logs to Splunk. Does anyone know how to onboard this type of log into Splunk?

Thanks in advance.

0 Karma


Assuming, these are under Event Viewer ( For example: Event Viewer > Windows Logs > Applications and Services ) you need to add monitors like below in  the local inputs.conf of the Windows host in question.

Example: Below is the way we specify the path of the channel from EventViewer for sending over UAC logs.  This is to be defined under 

c:\program files\splunk forwarder\apps\splunk_TA_Windows\local\inputs.conf

disabled = 0


You will have to adjust the path of the channel ( log folder) accordingly to where those KMS logs are stored..  Check this link for getting the path correct:

Note:  You can also get the path by right clicking on a sampe Event >> event properties >> Details >>  XML View >>  channel name


Pls vote up or mark as Solution  if it helps

0 Karma

Ultra Champion

KMS seems to have its own event log. So just add a [wineventlog://Key Management Service] stanza with proper windows settings (sourcetype, destination index) and you should be ready to go.

0 Karma
Get Updates on the Splunk Community!

Dashboard Studio Challenge - Learn New Tricks, Showcase Your Skills, and Win Prizes!

Reimagine what you can do with your dashboards. Dashboard Studio is Splunk’s newest dashboard builder to ...

Introducing Edge Processor: Next Gen Data Transformation

We get it - not only can it take a lot of time, money and resources to get data into Splunk, but it also takes ...

Take the 2021 Splunk Career Survey for $50 in Amazon Cash

Help us learn about how Splunk has impacted your career by taking the 2021 Splunk Career Survey. Last year’s ...