Release notes for the Splunk Add-on for Microsoft Hyper-V
About this release
Version 4.0.0 of the Splunk Add-on for Microsoft Hyper-V was released on July 26, 2021 and is compatible with the following software, CIM versions, and platforms.
|Splunk platform versions||8.0.x, 8.1.x, 8.2.x|
|Platforms||Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016 Microsoft Windows Server 2019 Microsoft Windows 8.1
|Vendor Products||Microsoft Hyper-V Server 2012 |
Microsoft Hyper-V Server 2016
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
The Splunk Add-on for Microsoft Hyper-V 4.0.0 includes the following improvements:
- Support of the latest versions of Microsoft Hyper-V server 2016 and Microsoft Hyper-V Server 2019
- Enhanced CIM v4.18.1 compatibility and mappings:
- Source-based CIM field extractions for WinEventLog inputs.
alertstag from WinEventLog sourcetypes and mapped events to Change DM.
- Updates hyperv_alerts eventtype to source based from sourcetype based.
- Removed unused resource tag from
- Removed snapshot tag from
- Addednew event types for enhancing CIM mappings:
Version 4.0.0 of the Splunk Add-on for Microsoft Hyper-V fixes the following issues.
|Date resolved||Issue number||Description|
|2021-06-14||ADDON-10462||Several events contain a value of "" for vm_os_version, vm_os, vm_id, and vm_name fields.|
Version 4.0.0 of the Splunk Add-on for Microsoft Hyper-V contains the following known issues.
Third-party software attributions
Version 4.0.0 of the Splunk Add-on for Microsoft Hyper-V does not incorporate any third-party software or libraries.
Source types for the Splunk Add-on for Microsoft Hyper-V
Release history for the Splunk Add-on for Microsoft Hyper-V
This documentation applies to the following versions of Splunk® Supported Add-ons: released
Feedback submitted, thanks!