Getting Data In

windows universal forwarder events not parsing on receiver

kerr63
New Member

Hello,
Using Splunk 4.2 (96430) for both a Universal Forwarder and a regular/receiver installation, on Windows Server 2003 R2, both systems same version, service pack, etc. Forwarder is successfully sending to receiver, correctly monitoring selected log files. We want to monitor the Windows Event Log for DNS services, and it is correctly sending that data; however, at the receiver, it is not parsing the DNS Server messages, stating:

"Message=Splunk could not get the description for this event. Either the component that raises this event is not installed on your local computer or the installation is corrupt."

DNS Server is also installed on the receiving system, and monitoring the DNS Server event log properly parses the local DNS events. All other fields (except hostname and record number) are identical, so it recognizes that these are DNS events.

How would one make the received (forwarded) DNS events parse to get the proper Message description just like the local DNS events? Both system have DNS server, same windows ver, etc. It seems even though Splunk is receiving the events properly, it won't parse the forwarded events.

Thanks-
J

0 Karma

kerr63
New Member

In the meantime, using another tool as a sender to the syslog "stream" also works. MS has a tool called LogParser which can be scripted and scheduled to read event logs and output to syslog, and the Snare Agent for Windows can also understand the event logs properly. The receiver/indexer accepts both of these just fine with proper event messages and descriptions.

0 Karma

Brian_Osburn
Builder

I think this is related to this bug:

The Message field is not extracted and is therefore missing from imported Windows event log file (.evt) data. (SPL-24947) (the list of known issues are located here.



From what I understand that this is a troublesome bug which resides mostly on Microsoft's side.

0 Karma

kerr63
New Member

Splunk extracts the message field properly for the local event log. What part of splunk is doing that, and where could the input from the forwarder be directed to do that same lookup? If it's reading it from a DLL or other event code table, there could be a way to process the forwarded events in the same fashion.

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...