All Apps and Add-ons

Windows NPS Logfile not monitored

StefanW
Path Finder

Hello,

i want to log my windows nps (network protection server or radius) to splunk. I found this thread. https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-parse-Radius-log-files-into-splunk-What-...

But my data is not forwarded to my splunk server. I installed the universal forwarder on the radius server and deployed the default windows app. My windows eventlogs are forwarded from the radius to the splunk server. But not das Radius Log file.

I created an app with inputs.conf and pros.conf like in the thread above.

The inputs.conf file

 

[monitor://C:\Windows\System32\LogFiles]
sourcetype = ias
index = radius
disabled = 0
whitelist=IN.*\.log
alwaysOpenFile=1

 

 

How can i find out, why the data is not forwarded ?

Labels (1)

StefanW
Path Finder

i found my mistake. I wrote in my inputs.log the sourcetype=ias. But i have not deployed the app with the same inputs.conf to my search head. so splunk cannot show the entries. Strange... but ok.

After copying the app to my searchhead/indexer i see the log entrys.

Get Updates on the Splunk Community!

.conf25 Registration is OPEN!

Ready. Set. Splunk! Your favorite Splunk user event is back and better than ever. Get ready for more technical ...

Detecting Cross-Channel Fraud with Splunk

This article is the final installment in our three-part series exploring fraud detection techniques using ...

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...