Added reference to helper tool found here:
I discovered this tool here:
Add notes regarding the necessity to have settings for "index=" which Splunk removed from the file in the "default" folders. If you don't catch this, your events will EITHER be dropped or, if you have setup a "lastChanceIndex", they will end up there.
Updated splunkbase URL with app-number/ID.
The pre-requisites for the add-on are as follows;
All Nodes: Splunk version 6.6 or higher
Installation instructions are as follows;
1) Ensure that Splunk everywhere is updated to Splunk version 6.0 or later.
Deploying to earlier versions is silly because Splunk_TA_windows v5*+
is not compatible for those versions.
2) Deploy app.
3) Use the dashboards to make changes to ensure a clean upgrde.
4) Upgrade the Splunk_TA_windows app.
Splunk Monitoring Console: App works best on Monitoring Console but you should run it on every search head.
This app consists of 1 dashboard and it either works or doesn't (it will).
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.