Splunk Search

I can see 2 different sourcetypes (xmlwineventlog, XmlWinEventLog)

RanjiRaje
Explorer

Hi All, It would be great help if anyone help me figure out this.

App is deployed in the UFs to receive such logs in splunk under the index wineventlog.

I can see 2 different sourcetypes (xmlwineventlog, XmlWinEventLog) under the wineventlog index

sourcetype : XmlWinEventLog (source : "XmlWinEventLog:Application", "XmlWinEventLog:Security", "XmlWinEventLog:System")

sourcetype : xmlwineventlog (source : "WinEventLog:Microsoft-Windows-Sysmon/Operational", "WinEventLog:Microsoft-Windows-Windows Defender/Operational")

Please help me where should I need to check these exact difference of two distinct case sensitive sourcetypes. Thanks

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

It is not clear to me what exactly you want to check. Please can you clarify?

0 Karma

RanjiRaje
Explorer

Hi, I wanted to know the exact path where I can see the mentioned sourcetypes. So that I can check under which category 2 different sourcetypes are defined and if possible, I can make it as a single sourcetype since both are of same name

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try looking in inputs.conf

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...