Hello
I'm trying to injest event from this Microsoft event viewer:
[WinEventLog://Microsoft-Windows-TerminalServices-ClientActiveXCore/Microsoft-Windows-TerminalServices-RDPClient/Operational]
disabled = 0
renderXml = 1
sourcetype = XmlWinEventLog
index = ad
My issue is, that the name of the event log the whole path is and not just "Operational" like the others.
Because of that I will get an error in Splunk:
ERROR ExecProcessor [5076 ExecProcessor] - message from ""C:\Program Files\SplunkUniversalForwarder\bin\splunk-winevtlog.exe"" splunk-winevtlog - WinEventMon::configure: Failed to find Event Log with channel name='Microsoft-Windows-TerminalServices-ClientActiveXCore/Microsoft-Windows-TerminalServices-RDPClient/Operational'
Is there a way to escape the "/" before Operational?
Thank you very much in advice.
Yes, your stanza name is too long. Loose the first part.
You can verify it with powershell
Check with what -LogName value you'll get results. It's way easier than blindly (re)configuring splunk inputs/
You need this value as channel name
I already have this in my stanza:
[WinEventLog://Microsoft-Windows-TerminalServices-ClientActiveXCore/Microsoft-Windows-TerminalServices-RDPClient/Operational]
disabled = 0
renderXml = 1
sourcetype = XmlWinEventLog
index = ad
whitelist3=1024
But I always going to get this error, even if I put the '\' escape before "Operational" or after
12-20-2021 09:08:21.416 +0100 ERROR ExecProcessor [21652 ExecProcessor] - message from ""C:\Program Files\SplunkUniversalForwarder\bin\splunk-winevtlog.exe"" splunk-winevtlog - WinEventMon::configure: Failed to find Event Log with channel name='Microsoft-Windows-TerminalServices-ClientActiveXCore/Microsoft-Windows-TerminalServices-RDPClient/Operational'
Yes, your stanza name is too long. Loose the first part.
You can verify it with powershell
Check with what -LogName value you'll get results. It's way easier than blindly (re)configuring splunk inputs/
this command was my solution:
Get-WinEvent -FilterHashTable @{ LogName = "Microsoft-Windows-TerminalServices-RDPClient/Operational"; ID = 1024 }
There is no "TerminalServices-ClientActiveXCore" in the PowerShell results. This also why Splunk told me all the time "failed to find ...." Thank you!
Is there anyone else that can help me, please?
The escape character is '\'.
Already tried, but it didn't work.. 😞