Splunk Search

Getting Data into Splunk

rockb
Explorer

I just installed splunk and imported my license.

I have a series of Windows event viewer files that have been exported that I want to import.  

I have tried the following:

  1. Settings --> Add Data
  2. Upload Files From My computer
  3. Select the file.  It reads the file.
  4. Next
  5. Select Preprocess-winevt
  6. Next
  7. Review
  8. Submit
  9. Start Searching

No events are shown.  

What am I doing wrong?

0 Karma

rockb
Explorer

I figured it out.  After the process is complete the Search window has host="xxxx" and sourcetype="preprocess-winevt".

 

If I delete host="xxxx" and sourcetype="preprocess-winevt". events are shown.  

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@rockb 

I hope checked in all time range and playing with search also.

Just guessing the reason and I doubt on retention period of Index. Just check the possible _time of indexed event and index retention period. 

0 Karma

rockb
Explorer

kamlesh,

 

I think you are saying to make sure that I am specifying to show all events not just events in a specific time period.  I did not select any time period and if I understand the interface correctly it is saying it sees no events prior to today at 10:52  There are 8198 events listed when I open the evtx file in Windows event viewer.

rockb_0-1620748411960.png

 

0 Karma
Get Updates on the Splunk Community!

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...

What’s New in Splunk Observability Cloud: January Feature Highlights & Deep Dives

Splunk Observability Cloud continues to evolve, empowering engineering and operations teams with advanced ...