Getting Data In

Why am I not seeing any Windows security event logs after installing a universal forwarder on a remote Windows server?

GLCFSCS
Explorer

I have a new standalone Splunk install that I want to test. It's installed on Windows.

I want to monitor the Windows Security event log of a remote Windows Server. I have installed the UF on this server.

There is a connection between the remote Windows server and the Splunk server, so that eliminates firewall and networking problems.

I am not seeing the Windows Security events on the Splunk server however.

What am I missing?

1 Solution

s72ucor
Explorer

Did you create that index on your Splunk server?

That error means that it tried to write to an index that isn't there.

Create the index and the events should go away.

View solution in original post

Michael
Contributor

I have a similar problem. I installed the UF, but the inputs.conf did NOT including the system, apps, or security events even though I selected them during install. I manually added, restarted. Confirmed forward destination is correct (outputs.conf).

Something you can test is make sure the networking (firewalls) are all OK with "netstat -an" to confirm they are communicating. This is almost always the problem (but not in this time...).

In my case, they are communicating, but no events are being forwarded even though they are being generated (confirmed with local Event Viewer).

0 Karma

Michael
Contributor

In my case, I followed the answer below and created the said index (wineventlog) and it worked.

Discovered this is default with the UF on Windows systems that it sends to this directory, not "main". I'm sure it says as much during the installation, but I must have missed it -- if not, it should be...

Apologies; not much to offer (yet) on the Linux issue (SELinux?). Although, this has always been a firewall issue for me on 'nix in the past...

0 Karma

chrisdavies76
New Member

Hi, I am also having same problem as Michael. Splunk installed on Linux host taking in syslog no problem. Two UF installed on two Windows2012R2 hosts, not sending windows event logs despite selecting them during UF install. Any ideas? Thanks,Hi, having exact same problem as Michael. I am new to Splunk and am reading as much as I can but would appreciate a point in the right direction to sort this out. I have Splunk Enterprise installed on a Linux host and working correctly taking in syslog. I have two universal forwarders installed on Windows 2012R2 hosts, one has IIS on and is sending the logs to the indexer correctly. Just no Windows Event Logs 😞

  • Chris
0 Karma

scc00
Contributor

Make sure your Indexers also have the Splunk App for Windows Infrastructure app and windows add-on installed. If the Indexers don't have the apps and related add-on you won't see any event data.

0 Karma

s72ucor
Explorer

s/events/errors/

0 Karma

s72ucor
Explorer

Did you create that index on your Splunk server?

That error means that it tried to write to an index that isn't there.

Create the index and the events should go away.

GLCFSCS
Explorer

OK, I created the index "wineventlog" and it's working.

0 Karma

Michael
Contributor

Ya, that message needs to be more prominent during the UF install -- that this needs to be done. This is going to burn a lot of people...

0 Karma

s72ucor
Explorer

On the UF make sure the Windows app has security event logs enabled in inputs.conf. Check to ensure output.conf is configured to send logs to your Splunk server.

On the Splunk server make sure your inputs.conf is configured to listen on 9997 (or your configured port). Make sure indexes.conf is configured with an index for security events. You'll need to create an index called msad unless you've selected another index on the UF.

Check splunkd.log for errors. Use netstat to see if the UF is sending/established on TCP 9997 and if the Splunk server is listening on tcp 9997. Even though you said they had a direct connection, make sure the windows firewall isn't blocking outbound ports from the UF and that the Splunk server is not being blocked inbound.

Between the conf files, netstat, firewalls, and log files you should see something. Also, try an obligatory UF service restart.

Let us know if any of these steps help.

GLCFSCS
Explorer

Addinitial info ... I get this error in Splunk:

received event for unconfigured/disabled/deleted index='wineventlog' with source='source::WinEventLog:Security' host='host::SERVER01' sourcetype='sourcetype::WinEventLog:Security' (1 missing total)

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...