Splunk® Add-on for Windows

Deploy and Use the Splunk Add-on for Windows

This documentation does not apply to the most recent version of Splunk® Add-on for Windows. For documentation on the most recent version, go to the latest release.

Release notes

This topic contains information on new features, known issues, and updates as we version the Splunk Add-on for Windows.

The latest version of the Splunk Add-on for Windows was released on Thursday, October 23, 2014.

What's new

Here's what's new in the latest version of the Splunk Add-on for Windows:

  • Bug fixes.

Current known issues

The Splunk Add-on for Windows has the following known issues:

  • On Windows Server 2003 systems, the sourcetypes for WinEventLog events are in lower case, while others have mixed case (for example: WinEventLog:Security versus WinEventLog:security). This causes filters set up in props.conf to fail to match. To work around the issue, read this Splunk Answers post. (SPL-78726, MSAPP-2916)

Change log (what's been fixed)

  • The add-on no longer invokes variable key-value field extractions unnecessarily. This should improve overall performance on apps which rely on the add-on. (MSAPP-3293)
Last modified on 23 October, 2014
Source types and CIM data model info  

This documentation applies to the following versions of Splunk® Add-on for Windows: 4.7.3


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters