Getting Data In

Ingesting Windows Service Status Data?

jamie1
Communicator

Hi There,

I am new to Splunk and am currently trying to get Windows Services data into Splunk. I am using Splunk Cloud and already have Windows Event Log data being ingested via a Universal Forwarder. I was attempting to make use of a search via Splunk Security Essentials and saw the following:

jamie1_0-1679928332824.png

Unfortunately, when trying to find help online or on Splunk Docs, I only saw solutions about changing inputs.conf. However, as I am on Splunk Cloud, I do not know if this would be possible.

Any help would be appreciated,

Jamie

Labels (3)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

The inputs.conf file is on your UF, which you can access.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

The inputs.conf file is on your UF, which you can access.

---
If this reply helps you, Karma would be appreciated.

jamie1
Communicator

Hey,

This information helped, thanks man 🙂

Jamie

Get Updates on the Splunk Community!

Splunk Enterprise Security 8.0.2 Availability: On cloud and On-premise!

A few months ago, we released Splunk Enterprise Security 8.0 for our cloud customers. Today, we are excited to ...

Logs to Metrics

Logs and Metrics Logs are generally unstructured text or structured events emitted by applications and written ...

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...