Security

Why is Sourcetype not displaying data in Ingest Action?

Bob_Goble
New Member

I am trying to make splunk less noisy and filter out some of our 4688 events.  I have tried to use the Ingest Action on our Indexer but when I select our sourcetype "WMI:WinEventLog:Security"  none of the data appears when I pull a sample.  If I run a straight search query I can see the data and filter down to the correct events I want to filter out.  Is there something I'm missing?

Labels (1)
0 Karma

the0duke0
Path Finder

I ran into a similar issue, and there could be at least two reasons for this. Here is the search the wizard generates:

index=* OR index=_* _sourcetype="WinEventLog"
| where _sourcetype="WinEventLog"
| head 100

1. The Ingest Sample Data wizard uses the "where" search command, which is case sensitive. So make sure the sourcetype case matches how it actually shows up in events.  WinEventLog is not the same is wineventlog.

2. The wizard also uses the _sourcetype field instead of the sourcetype field. That means that if there is any sourcetype transformation happing already, the _sourcetype field will have the original sourcetype. You can check this by searching for your events and adding this _souredcetype field (which is normally hidden).

index=* sourcetype="winEventLog" | head 100 | eval orig_sourcetype=_sourcetype 

 Patrick

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...