We have a UF installed on one of the windows servers, all the configurations seem fine, and the ports are also opened still the server is not forwarding the data to Splunk.
First, ensure the UF is actually running on the Windows server:
Check UF Logs for Errors
Common issues to spot:
Validate Forwarding Configuration
Example of a correct configuration:
[tcpout]
defaultGroup = my_indexers
[tcpout:my_indexers]
server = <indexer_IP>:9997
Things to verify:
Confirm Network Connectivity
Since you’ve said ports are open, let’s test connectivity explicitly: From the Windows server, open a Command Prompt and run:
telnet <indexer_IP> 9997 (replace with your indexer’s IP and port).
If it connects (blank screen), the connection is good. If it fails ("Connect failed"), there’s a network issue despite open ports.
Alternative: Use PowerShell:
Test-NetConnection -ComputerName <indexer_IP> -Port 9997
If it fails:
Verify Indexer Receiving Configuration
Example for Windows Event Logs:
[WinEventLog://Application]
disabled = false
index = my_index
First, ensure the UF is actually running on the Windows server:
Check UF Logs for Errors
Common issues to spot:
Validate Forwarding Configuration
Example of a correct configuration:
[tcpout]
defaultGroup = my_indexers
[tcpout:my_indexers]
server = <indexer_IP>:9997
Things to verify:
Confirm Network Connectivity
Since you’ve said ports are open, let’s test connectivity explicitly: From the Windows server, open a Command Prompt and run:
telnet <indexer_IP> 9997 (replace with your indexer’s IP and port).
If it connects (blank screen), the connection is good. If it fails ("Connect failed"), there’s a network issue despite open ports.
Alternative: Use PowerShell:
Test-NetConnection -ComputerName <indexer_IP> -Port 9997
If it fails:
Verify Indexer Receiving Configuration
Example for Windows Event Logs:
[WinEventLog://Application]
disabled = false
index = my_index
# inputs.conf
[monitor://C:\path\to\logs]
disabled = false
sourcetype = my_sourcetype
# outputs.conf
[tcpout:my_indexer]
server = indexer_hostname:9997
1. Splunk process is running on the server.
2. Configured the correct inputs under inputs.conf and outputs. conf
###### OS Logs ######
[WinEventLog://Application]
disabled = 0
start_from = oldest
current_only = 0
checkpointInterval = 300
index = wineventlog
renderXml=false
[WinEventLog://Security]
disabled = 0
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 1
checkpointInterval = 300
blacklist1 = EventCode="4662" Message="Object Type:\s+(?!groupPolicyContainer)"
blacklist2 = EventCode="566" Message="Object Type:\s+(?!groupPolicyContainer)"
blacklist3 = EventCode="5447"
index = wineventlog
renderXml=false
Check the splunkd.log for more detailed information.