Splunk Search

Getting Data into Splunk

rockb
Explorer

I just installed splunk and imported my license.

I have a series of Windows event viewer files that have been exported that I want to import.  

I have tried the following:

  1. Settings --> Add Data
  2. Upload Files From My computer
  3. Select the file.  It reads the file.
  4. Next
  5. Select Preprocess-winevt
  6. Next
  7. Review
  8. Submit
  9. Start Searching

No events are shown.  

What am I doing wrong?

0 Karma

rockb
Explorer

I figured it out.  After the process is complete the Search window has host="xxxx" and sourcetype="preprocess-winevt".

 

If I delete host="xxxx" and sourcetype="preprocess-winevt". events are shown.  

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@rockb 

I hope checked in all time range and playing with search also.

Just guessing the reason and I doubt on retention period of Index. Just check the possible _time of indexed event and index retention period. 

0 Karma

rockb
Explorer

kamlesh,

 

I think you are saying to make sure that I am specifying to show all events not just events in a specific time period.  I did not select any time period and if I understand the interface correctly it is saying it sees no events prior to today at 10:52  There are 8198 events listed when I open the evtx file in Windows event viewer.

rockb_0-1620748411960.png

 

0 Karma
Get Updates on the Splunk Community!

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...