Hello
I have done a data entry in Splunk for the log event below :
[WinEventLog://Microsoft-Windows-PowerCfg/Diagnostic]
checkpointInterval = 5
current_only = 0
disabled = 0
index = windows
start_from = oldest
But when I'm doing a search on this sourcetype, i have no events
I think its because these event logs don't exist in the event viewer?
if its the case is anybody knows how to create it?
thanks
If there are no events in the Windows Event Viewer on that server, then you are correct: there is nothing to be sent to Splunk so you will not have any events to search.
from this host, do you have other logfiles being sent to Splunk?!?! are they reaching splunk indexer properly?!?!
after added the inputs.conf on that windows system, did you do splunk service restart?!?!
yes for all your questions....
try to put index=windows
or index=*
before your search
I done it but no events....
ok. please start here:
http://docs.splunk.com/Documentation/Splunk/7.1.2/Troubleshooting/Cantfinddata
read all the way through.