Get Windows server data - Splunk Documentation (2024)

The Content Pack for Windows Dashboards and Reports provides visibility into the health and performance of your Microsoft Windows Server and Active Directory environments. The content pack relies on data collected by the Splunk Add-on for Windows to populate the dashboards and reports provided by the content pack.

The Splunk Add-on for Windows is required in order to access data from the following resources:

  • All hosts that run Active Directory Domain Services, including domain controllers and DNS servers.
  • All Windows hosts from which you want Windows data.
  • All indexers.
  • All search heads.

Download the Splunk Add-on for Windows

Perform the following high-level steps to download the Splunk Add-on for Windows:

  1. Download the Splunk Add-on for Windows from Splunkbase and save it to an accessible place on the deployment server.
  2. When prompted, choose an accessible location on your deployment server to save the download. Do not attempt to run the download.
  3. Unarchive the file to an accessible location.

For more detailed instructions, see Install the Splunk Add-on for Windows in the Splunk Add-on for Windows manual.

Configure the Splunk Add-on for Windows

Perform the following high-level steps to configure the Splunk Add-on for Windows:

You must complete these steps for Windows perfmon data to be used in dashboards.

  1. In the location where you unarchived the downloaded app file, locate the Splunk_TA_windows directory.
  2. Create a local subdirectory within the Splunk_TA_windows directory.
  3. Copy the inputs.conf file in the default subdirectory to the local directory.
  4. Edit the disabled and mode attributes in the inputs.conf file. You can optionally add an index attribute to use specific indexes.

Microsoft Windows event logs that are rendered in XML format will not populate in the Content Pack for Windows Dashboards and Reports.

Version 5.0.1 and higher of the Splunk Add-on for Windows collects data in multikv mode by default. This mode has a different event format over the existing single mode. The Content Pack for Windows Dashboards and Reports only supports single mode. You must change the value of the mode parameter to single in the perfmon stanzas in /Splunk_TA_windows/default/inputs.conf on forwarder.

You can refer to the following example input stanzas:

[perfmon://CPU]counters =% Processor Time;% User Time;% Privileged Time; Interrupts/sec;% DPC Time;% Interrupt Time; DPCs Queued/sec; DPC Rate;% Idle Time;% C1 Time;% C2 Time;% C3 Time; C1 Transitions/sec; C2 Transitions/sec; C3 Transitions/secdisabled = 0instances = *interval = 10mode = singleobject = ProcessoruseEnglishOnly=true ## Logical Disk[perfmon://LogicalDisk]counters =% Free Space; Free Megabytes; Current Disk Queue Length;% Disk Time; Avg. Disk Queue Length;% Disk Read Time; Avg. Disk Read Queue Length;% Disk Write Time; Avg. Disk Write Queue Length; Avg. Disk sec/Transfer; Avg. Disk sec/Read; Avg. Disk sec/Write; Disk Transfers/sec; Disk Reads/sec; Disk Writes/sec; Disk Bytes/sec; Disk Read Bytes/sec; Disk Write Bytes/sec; Avg. Disk Bytes/Transfer; Avg. Disk Bytes/Read; Avg. Disk Bytes/Write;% Idle Time; Split IO/Secdisabled = 0instances = *interval = 10mode = singleobject = LogicalDiskuseEnglishOnly=true ## Physical Disk[perfmon://PhysicalDisk]counters = Current Disk Queue Length;% Disk Time; Avg. Disk Queue Length;% Disk Read Time; Avg. Disk Read Queue Length;% Disk Write Time; Avg. Disk Write Queue Length; Avg. Disk sec/Transfer; Avg. Disk sec/Read; Avg. Disk sec/Write; Disk Transfers/sec; Disk Reads/sec; Disk Writes/sec; Disk Bytes/sec; Disk Read Bytes/sec; Disk Write Bytes/sec; Avg. Disk Bytes/Transfer; Avg. Disk Bytes/Read; Avg. Disk Bytes/Write;% Idle Time; Split IO/Secdisabled = 0instances = *interval = 10mode = singleobject = PhysicalDiskuseEnglishOnly=true ## Memory[perfmon://Memory]counters = Page Faults/sec; Available Bytes; Committed Bytes; Commit Limit; Write Copies/sec; Transition Faults/sec; Cache Faults/sec; Demand Zero Faults/sec; Pages/sec; Pages Input/sec; Page Reads/sec; Pages Output/sec; Pool Paged Bytes; Pool Nonpaged Bytes; Page Writes/sec; Pool Paged Allocs; Pool Nonpaged Allocs; Free System Page Table Entries; Cache Bytes; Cache Bytes Peak; Pool Paged Resident Bytes; System Code Total Bytes; System Code Resident Bytes; System Driver Total Bytes; System Driver Resident Bytes; System Cache Resident Bytes;% Committed Bytes In Use; Available KBytes; Available MBytes; Transition Pages RePurposed/sec; Free & Zero Page List Bytes; Modified Page List Bytes; Standby Cache Reserve Bytes; Standby Cache Normal Priority Bytes; Standby Cache Core Bytes; Long-Term Average Standby Cache Lifetime (s)disabled = 0interval = 10mode = singleobject = MemoryuseEnglishOnly=true ## Network[perfmon://Network]counters = Bytes Total/sec; Packets/sec; Packets Received/sec; Packets Sent/sec; Current Bandwidth; Bytes Received/sec; Packets Received Unicast/sec; Packets Received Non-Unicast/sec; Packets Received Discarded; Packets Received Errors; Packets Received Unknown; Bytes Sent/sec; Packets Sent Unicast/sec; Packets Sent Non-Unicast/sec; Packets Outbound Discarded; Packets Outbound Errors; Output Queue Length; Offloaded Connections; TCP Active RSC Connections; TCP RSC Coalesced Packets/sec; TCP RSC Exceptions/sec; TCP RSC Average Packet Sizedisabled = 0instances = *interval = 10mode = singleobject = Network InterfaceuseEnglishOnly=true ## Process[perfmon://Process]counters =% Processor Time;% User Time;% Privileged Time; Virtual Bytes Peak; Virtual Bytes; Page Faults/sec; Working Set Peak; Working Set; Page File Bytes Peak; Page File Bytes; Private Bytes; Thread Count; Priority Base; Elapsed Time; ID Process; Creating Process ID; Pool Paged Bytes; Pool Nonpaged Bytes; Handle Count; IO Read Operations/sec; IO Write Operations/sec; IO Data Operations/sec; IO Other Operations/sec; IO Read Bytes/sec; IO Write Bytes/sec; IO Data Bytes/sec; IO Other Bytes/sec; Working Set - Privatedisabled = 0instances = *interval = 10mode = singleobject = ProcessuseEnglishOnly=true ## ProcessInformation[perfmon://ProcessorInformation]counters =% Processor Time; Processor Frequencydisabled = 0instances = *interval = 10mode = singleobject = Processor InformationuseEnglishOnly=true ## System[perfmon://System]counters = File Read Operations/sec; File Write Operations/sec; File Control Operations/sec; File Read Bytes/sec; File Write Bytes/sec; File Control Bytes/sec; Context Switches/sec; System Calls/sec; File Data Operations/sec; System Up Time; Processor Queue Length; Processes; Threads; Alignment Fixups/sec; Exception Dispatches/sec; Floating Emulations/sec;% Registry Quota In Usedisabled = 0instances = *interval = 10mode = singleobject = SystemuseEnglishOnly=true

You can either create the default Windows index as mentioned in the section Create the required Indexes, or you can create your own custom index and then update the event types as mentioned in the section Update configuration files to use custom indexes. If you use the default Windows index, you must add index parameters with the values in the following table, located in /Splunk_TA_windows/default/inputs.conf on the forwarder.

Input stazaIndexesEvent types
[WinEventLog://Application], [WinEventLog://Security], [WinEventLog://System], [WinEventLog://ForwardedEvents]wineventlogwineventlog_index_windows
[monitor://$WINDIR\System32\DHCP], [monitor://$WINDIR\WindowsUpdate.log], [script://.\bin\win_listening_ports.bat], [script://.\bin\win_installed_apps.bat], [script://.\bin\win_timesync_status.bat], [script://.\bin\win_timesync_configuration.bat],

[WinHostMon://Computer], [WinHostMon://Process], [WinHostMon://Processor], [WinHostMon://NetworkAdapter], [WinHostMon://Service], [WinHostMon://OperatingSystem], [WinHostMon://Disk], [WinHostMon://Driver], [WinHostMon://Roles], [WinPrintMon://printer], [WinPrintMon://driver], [WinPrintMon://port], [WinNetMon://inbound], [WinNetMon://outbound]

windowswindows_index_windows
[perfmon://CPU], [perfmon://LogicalDisk], [perfmon://PhysicalDisk], [perfmon://Memory], [perfmon://Network], [perfmon://Process], [perfmon://ProcessorInformation], [perfmon://System]perfmonperfmon_index_windows
[admon://default], [WinRegMon://default], [WinRegMon://hkcu_run], [WinRegMon://hklm_run]windowswindows_index_windows
[monitor://$WINDIR\debug\netlogon.log], [MonitorNoHandle://$WINDIR\System32\Dns\dns.log],

[script://.\bin\runpowershell.cmd nt6-repl-stat.ps1], [powershell://Replication-Stats],[script://.\bin\runpowershell.cmd nt6-health.ps1], [powershell://AD-Health][script://.\bin\runpowershell.cmd nt6-siteinfo.ps1], [powershell://Siteinfo] [script://.\bin\runpowershell.cmd dns-zoneinfo.ps1], [script://.\bin\runpowershell.cmd dns-health.ps1], [admon://default]

msadmsad_index_windows

Save the inputs.conf in the local subdirectory. The following is an example inputs.conf staza:

[perfmon://CPU]counters =% Processor Time;% User Time;% Privileged Time; Interrupts/sec;% DPC Time;% Interrupt Time; DPCs Queued/sec; DPC Rate;% Idle Time;% C1 Time;% C2 Time;% C3 Time; C1 Transitions/sec; C2 Transitions/sec; C3 Transitions/secdisabled = 0instances = *interval = 10mode = singleobject = ProcessoruseEnglishOnly=trueindex = perfmon [WinEventLog://Application]disabled = 0start_from = oldestcurrent_only = 0checkpointInterval = 5renderXml=falseindex = wineventlog [WinPrintMon://port]type = portinterval = 600baseline = 1disabled = 0index = windows [script://.\bin\runpowershell.cmd nt6-siteinfo.ps1]source=Powershellsourcetype=MSAD:NT6:SiteInfointerval=3600disabled=0index = msad

Create the required Indexes

The Content Pack for Windows Dashboards and Reports requires the following four indexes for indexing and displaying the incoming data from the Splunk Add-on for Windows:

  • msad
  • perfmon
  • windows
  • wineventlog

Refer to the following links to learn how to create indexes:

  • For Splunk Enterprise users, see Create events indexes in the Managing Indexers and Clusters of Indexers manual.
  • For Splunk Cloud Platform users, contact Splunk Support to set up, manage, and maintain the cloud index parameters. See Manage Splunk Cloud Platform indexes in the Splunk Cloud Platform Admin Manual.

You can also use custom indexes to ingest the data by updating the relevant event types. Refer to the section Update configuration files to use custom indexes for more details.

Update configuration files to use custom indexes

Perform the following steps to update configuration files to use custom index(es):

  1. Copy the inputs.conf file from the default subdirectory /Splunk_TA_windows/default/ to the local directory folder /Splunk_TA_windows/local/ folder of the forwarder.
  2. Open the inputs.conf in the local subdirectory with a text editor.
  3. If you are using <<CUSTOM INDEX>> instead of TA_windows default indexes then add index = <<CUSTOM INDEX>> under stanzas as defined in the table above for the Windows default index(es). Refer to the previous table for Windows default indexes.

The following are examples of inputs stanzas:

[perfmon://CPU]counters =% Processor Time;% User Time;% Privileged Time; Interrupts/sec;% DPC Time;% Interrupt Time; DPCs Queued/sec; DPC Rate;% Idle Time;% C1 Time;% C2 Time;% C3 Time; C1 Transitions/sec; C2 Transitions/sec; C3 Transitions/secdisabled = 1instances = *interval = 10mode = singleobject = ProcessoruseEnglishOnly=trueindex = <<CUSTOM INDEX>> [WinEventLog://Application]disabled = 1start_from = oldestcurrent_only = 0checkpointInterval = 5renderXml=falseindex = <<CUSTOM INDEX>> [WinPrintMon://port]type = portinterval = 600baseline = 1disabled = 1index = <<CUSTOM INDEX>>

Update eventtypes.conf

Perform the following steps to update eventtypes.conf files to a custom index:

  1. Copy the eventtypes.conf file from the default subdirectory /DA-ITSI-CP-windows-dashboards/default/ to the local directory folder /DA-ITSI-CP-windows-dashboards/local/ folder on the search head.
  2. Open the eventtypes.conf in the local subdirectory with a text editor.
  3. If you are using <<CUSTOM INDEX>> instead of Windows default indexes, then update the eventtype definitions as shown in the following table:
Default indexCustom indexUpdated eventtypes
perfmon<<CUSTOM INDEX 1>>[perfmon_index_windows], definition = index=perfmon OR index=<<CUSTOM INDEX 1>>
wineventlog<<CUSTOM INDEX 2>>[wineventlog_index_windows], definition = index=wineventlog OR index=<<CUSTOM INDEX 2>>
windows<<CUSTOM INDEX 3>>[windows_index_windows], definition = index=windows OR index=<<CUSTOM INDEX 3>>

Update configuration files to use the main index

Perform the following steps to update eventtypes.conf files to the main index:

  1. Copy the eventtypes.conf file from the default subdirectory /DA-ITSI-CP-windows-dashboards/default/ to the local directory folder /DA-ITSI-CP-windows-dashboards/local/ folder on the search head.
  2. Open the eventtypes.conf in the local subdirectory with a text editor.
  3. If you are using index=main instead of Windows default indexes, then update the eventtype definitions as shown in the following table:
Default indexMain indexUpdated eventtypes
perfmonmain[perfmon_index_windows], definition = index=perfmon OR index=main
wineventlogmain[wineventlog_index_windows], definition = index=wineventlog OR index=main
windowsmain[windows_index_windows], definition = index=windows OR index=main
Get Windows server data - Splunk Documentation (2024)
Top Articles
Latest Posts
Article information

Author: Mrs. Angelic Larkin

Last Updated:

Views: 6289

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Mrs. Angelic Larkin

Birthday: 1992-06-28

Address: Apt. 413 8275 Mueller Overpass, South Magnolia, IA 99527-6023

Phone: +6824704719725

Job: District Real-Estate Facilitator

Hobby: Letterboxing, Vacation, Poi, Homebrewing, Mountain biking, Slacklining, Cabaret

Introduction: My name is Mrs. Angelic Larkin, I am a cute, charming, funny, determined, inexpensive, joyous, cheerful person who loves writing and wants to share my knowledge and understanding with you.