Getting Data In

Why are Windows Event Logs sent and indexed every half hour?

Path Finder

Our domain controllers were resending the entire Windows EventLog every 30 minutes. No duplicate inputs entries. No duplicate outputs entries. Using a search like

host=foohost index=bar_index earliest=-1h | 
convert ctime(_indextime) | 
convert ctime(_time) | 
stats count list(host) list(splunk_server) list(_time) list(_indextime) by _raw 

would display multiple indexings of the exact same _raw message, even the timestamp. Adjusting the earliest parameter showed that it happened every 30 minutes.

We encountered this on Splunk 6.5.1

We tried a fresh re-install of the forwarder, no change.

We tried inspecting the checkpoint file, but it wasn't corrupt or anything.

0 Karma
1 Solution

Path Finder

After much debugging with Splunk support, we determined that having

start_from=newest

in our configs was a primary cause of the behavior. Disabling that directive on the inputs, going back to the default

start_from = oldest

eliminated the issue immediately. Hopefully this helps others.

View solution in original post

Path Finder

After much debugging with Splunk support, we determined that having

start_from=newest

in our configs was a primary cause of the behavior. Disabling that directive on the inputs, going back to the default

start_from = oldest

eliminated the issue immediately. Hopefully this helps others.

View solution in original post

Splunk Employee
Splunk Employee

Hi,
- Is the sourcetype the same? WMI enabled? Possible some other host is doing WMI collection? sourcetype would tell you that.
- If you disable inputs.conf will you still get logs?
- Check metrics.logs
- How was the UF installed? CLI installation with WINEVENTLOG_SEC_ENABLE=0 WINEVENTLOG_SYS_ENABLE=0 ?

I hope this help you debugging the issue!

0 Karma
Don’t Miss Global Splunk
User Groups Week!

Free LIVE events worldwide 2/8-2/12
Connect, learn, and collect rad prizes and swag!