For some time now I have been using Splunk to log all the basic Windows event logs such as App, Security, Setup, System, and Forwarded Events, but I cannot find a simple way to grab all the "Applications and Services Logs" since as far as I can tell, there is no way to use wildcards in the config to achieve this.
I personally do not want to hand type all the possible logs under this directory for each server and was hoping someone had a simple answer to this?
As you've found there isnt a wildcard method. To make matters worse if you create custom windows event logs using your own applications, you have to add these to the windows event log viewer at least once, before you can consume them with Splunk. It has to do with some windows intricacies though and Splunk isn't to blame for that.
Another method is to write a script to dump the logs to file, but I would suggest many of the "Applications and Services Logs" that you have are A. Not enabled, B. Not useful to your end goal, and C. perhaps a waste of splunk licensing to index them.