Hi,
got some problem in my searches since a few days.
I really don´t know what happend and no one changed the configuration.
In search or dashboards for Cisco Network I get for every search the error "Eventtype 'wineventlog_security' does not exist or is disabled"
search example: Index=firewall
The question is why when I search an completly unrelated index to windows it shows the error from the eventtype from the Windows-TA ? and also it doesn´t show any results.
I will keep it short.
We found a solution to the errors.
If you just restart the Indexer or Searchhead which throws the errors or make a new connection as search peer won´t help.
We shut down the whole Splunk farm. Indexer, SH, Licence Server, Deploymentserver etc...
When all server are off you can start them again.
Everything resumed to working fine without errors.
@Benny87
Some dashboards, saved searches, or macros reference the wineventlog_security eventtype globally—even if your current search is for non-Windows data like firewalls or switches
If the event type is missing, disabled, or its permissions are not set to "global," Splunk throws this error regardless of the actual index being searched
This can also happen after app upgrades, permission changes, or if the Splunk_TA_windows is not deployed on all relevant search heads and indexers
Hi @Benny87
What kind of architecture do you have? Do you have multiple indexers? Please could you do a btool to check the eventtypes on the SH and an Indexer:
$SPLUNK_HOME/bin/splunk btool eventtypes list --debug wineventlog_security
Im also wondering if something that matches another eventtype for your firewall data is also referencing wineventlog_security... if you do the same btool output as above without the final "wineventlog_security" do you see "wineventlog_security" within any other stanzas?
🌟 Did this answer help you? If so, please consider:
Your feedback encourages the volunteers in this community to continue contributing
Hi @Benny87 ,
check if this eventtype is shared at App or Global level: it must be Global.
you can do this at [settings > Eventtypes].
Ciao.
Giuseppe
The windows -TA eventtypes are all Globylly shared and access is read for everyone.
The problem is why now and not a few days ago. The error just stated to show up a few days ago without any change to any configuration.
Hi @Benny87 ,
what does it happen if you run eventtype=wineventlog_security from a search dashboard in your app?
do you have the same message or a different one?
did you recently changed the version of Splunk_TA_Windows?
recently there was a change to the data structure of the TA: sourcetype is WinEventLog or xmlWinEventLog and the difference between Security, Application and System is in the source field.
Otherwise, you can open a case to Splunk Support, because this Add-On is Splunk supported.
Ciao.
Giuseppe
for the search: Eventtype=wineventlog_security there´s no results.
The errors are:
[Indexer] Eventtype 'wineventlog_security' does not exist or is disabled
[Indexer] Ignoring eventtype 'wineventlog_security' for search expansion due to error="search string cannot be empty"
remote search process failed on peer
As for additional information, the error just shows up for index searches where NO windows eventlog are involved. Just for our firewalls, switches and other devices.
As long as I search for windows indexes ex. Index=wineventlog_security or index=wineventlog_system there´s no error.