I had this issue until I added the index that the data was in to the event type creation for the ossec event type. In Splunk at the top right click on Settings > Event types you should see an event type creation for "ossec" where the search string is "sourcetype=ossec* NOT sourcetype=ossec_agent_control" add your index there like this "index=myindex sourcetype=ossec* NOT sourcetype=ossec_agent_control". This will properly create the ossec even type and will cascade to the event types below it. You can add the index to all of the other event type creations for faster searching but you don't have to.
... View more