Splunk Search

Search Issue

himapate
Explorer

Hi,

When i try to search data using command sourcetype="WinEventLog:Security" there is no result for it.
However when i run index="wineventlog" sourcetype="WinEventLog:Security" i get all my result.
What shall i do i this case ?
In my environment i have 1 indexer and 1 search head

Thanks

0 Karma

esix_splunk
Splunk Employee
Splunk Employee

You should read the docs.

You dont have the wineventlog set in your default search for your user or the group the use is in. Look at the permissions and associated Role Based Access Control. Here is the starting point : http://docs.splunk.com/Documentation/Splunk/6.4.3/Security/Aboutusersandroles

You will need to add either "All Non-Internal Indexes" as a search capability, or add your manually created indexes to the Indexes searched by default.

Best practices though is to include your index in your base search.

0 Karma
Get Updates on the Splunk Community!

Technical Workshop Series: Splunk Data Management and SPL2 | Register here!

Hey, Splunk Community! Ready to take your data management skills to the next level? Join us for a 3-part ...

Spotting Financial Fraud in the Haystack: A Guide to Behavioral Analytics with Splunk

In today's digital financial ecosystem, security teams face an unprecedented challenge. The sheer volume of ...

Solve Problems Faster with New, Smarter AI and Integrations in Splunk Observability

Solve Problems Faster with New, Smarter AI and Integrations in Splunk Observability As businesses scale ...