Getting Data In

Windows custom events logs not showing up in Splunk

yanivdutt
Explorer

Hi ,
Below is custom event logs which I am configuring on windows forwarder but they are not showing up in Splunk. We can see events coming from default events like system,security etc. Below is syntax I am using

[WinEventLog://Citirix Delivery Services]
disabled = 0
start_from = oldest
current_only = 1
checkpointInterval = 5
index = wineventlog

alt text

Attached screenshot shows location of event logs

0 Karma

javiergn
Super Champion

Hi,

Just some comments to that:

  • Isn't the name in your config file wrong? Shouldn't it be "Citrix Delivery Services" instead of "Citirix Delivery Services]" (notice the extra i)
  • I can't see your screenshot very well but there seems to be two blank spaces between Delivery and Services, is that the case?
  • Also, is "Citrix Delivery Services" the full path of your event log?
  • Finally, have you tried reading from any other log in the same folder such as "Internet Explorer" and see if that works?

Thanks,
J

0 Karma

yanivdutt
Explorer

@javiergn
Yes Citrix delivery services is complete folder. Somehow i started seeing data after windows server reboot. Now I am adding couple more customized . Below is events I want to see and screenshot. Is path mentioned correct ? This event is underneath other events from events view, but exist in same folder structure

[WinEventLog://Citrix-CDF_ErrorReporter/Admin]
disabled = 0
start_from = oldest
current_only = 1
checkpointInterval = 5
index = wineventlog

alt text

0 Karma

javiergn
Super Champion

Hi, as per the screenshot the path looks correct to me.
Hopefully that should be working just fine.

If you are happy with the resolution of this issue please do not forget to mark it as answered so that it can be closed.

Thanks,
J

0 Karma

yanivdutt
Explorer

Thanks for replying. It was typo in post. Was using correct syntax in my use case

[WinEventLog://Citrix Delivery Services]
disabled = 0
start_from = oldest
current_only = 1
checkpointInterval = 5
index = wineventlog

0 Karma

javiergn
Super Champion

What about the other 3 points I mentioned above?
Did you manage to try any of that?

Regards,
J

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...