When run from a Splunk search head, this search will return sourcetypes seen that do not have apps with configs for the listed sourcetype.
For example, if it returns WinEventLog
, you should download the Windows TA to perform search-time parsing for these events.
| tstats c where index=* by sourcetype
| append
[| rest /services/saved/sourcetypes splunk_server=local
| fields title eai:acl.app
| rename title as sourcetype, eai:acl.app as app