Splunk® Add-on for Windows

Deploy and Use the Splunk Add-on for Windows

This documentation does not apply to the most recent version of Splunk® Add-on for Windows. For documentation on the most recent version, go to the latest release.

Release notes

This topic contains information on new features, known issues, and updates as we version the Splunk Add-on for Windows.

The latest version of the Splunk Add-on for Windows was released on Tuesday, March 31, 2015.

What's new

Here's what's new in the latest version of the Splunk Add-on for Windows:

  • The add-on has improved logic for extracting Windows Registry information. (TAG-9106)

Current known issues

The Splunk Add-on for Windows has the following known issues:

  • On Windows Server 2003 systems, the sourcetypes for WinEventLog events are in lower case, while others have mixed case (for example: WinEventLog:Security versus WinEventLog:security). This causes filters set up in props.conf to fail to match. To work around the issue, read this Splunk Answers post. (SPL-78726, MSAPP-2916)

Change log (what's been fixed)

  • The add-on has improved logic for extracting Windows Registry information. (TAG-9106)
Last modified on 31 March, 2015
Source types and CIM data model info  

This documentation applies to the following versions of Splunk® Add-on for Windows: 4.7.5


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters