Splunk® Add-on for Windows

Deploy and Use the Splunk Add-on for Windows

This documentation does not apply to the most recent version of Splunk® Add-on for Windows. For documentation on the most recent version, go to the latest release.

Release notes

This topic contains information on new features, known issues, and updates as we version the Splunk Add-on for Windows.

The latest version of the Splunk Add-on for Windows was released on Thursday, February 12, 2015.

What's new

Here's what's new in the latest version of the Splunk Add-on for Windows:

  • Bug fixes.
  • The add-on has been updated to better handle interaction with host field values in generated event data. (TAG-8935)

Current known issues

The Splunk Add-on for Windows has the following known issues:

  • On Windows Server 2003 systems, the sourcetypes for WinEventLog events are in lower case, while others have mixed case (for example: WinEventLog:Security versus WinEventLog:security). This causes filters set up in props.conf to fail to match. To work around the issue, read this Splunk Answers post. (SPL-78726, MSAPP-2916)

Change log (what's been fixed)

  • A problem with the secrpt-new-users macro has been fixed. (TAG-8945)
  • A problem with a transform that prevented the "User Account Lockout" dashboard from display events correctly was fixed. (TAG-8915, TAG-8894)
  • A problem with a transform that prevented security log field extractions from working properly was fixed. (TAG-3433)
Last modified on 13 February, 2015
Source types and CIM data model info  

This documentation applies to the following versions of Splunk® Add-on for Windows: 4.7.4


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters