<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Defining the multiple source type from single file (we are using the add-on Splunk Add-on for ISC BIND) in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Defining-the-multiple-source-type-from-single-file-we-are-using/m-p/433594#M53223</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;As per Splunk Add-on for ISC BIND dns query and dns errors logs should be in different file however we have single file which has query and error logs together .&lt;/P&gt;

&lt;P&gt;Issue is what sourcetype should we define so that sourcetype are tagged based on the query or error logs.&lt;/P&gt;

&lt;P&gt;Current scenario :&lt;BR /&gt;
query logs and error logs are written into single file . Let's say dns.logs&lt;/P&gt;

&lt;P&gt;Now in &lt;STRONG&gt;input.conf&lt;/STRONG&gt; on Heavy Forwader&lt;/P&gt;

&lt;P&gt;[monitor:///opt/syslog-data/dnsserver/dns.log]&lt;BR /&gt;
host_regex = .&lt;EM&gt;\/(.&lt;/EM&gt;)\/\d\d\d\d-\d\d-\d\d.log&lt;BR /&gt;
sourcetype =  &lt;STRONG&gt;[what sourcetype should i define here ]&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt; &lt;/P&gt;

&lt;P&gt;[isc:bind:query]&lt;BR /&gt;
REPORT-1_extract_field = isc_bind_query_extract_field_0&lt;BR /&gt;
EVAL-message_type = "Query"&lt;BR /&gt;
EVAL-query_type = "Query"&lt;BR /&gt;
EVAL-vendor_product = "ISC:Bind"&lt;BR /&gt;
LOOKUP-2_look_up_extract = isc_bind_severities_lookup vendor_severity OUTPUT severity&lt;BR /&gt;
LOOKUP-3_look_up_extract = isc_bind_category_lookup sourcetype OUTPUT vendor_category&lt;/P&gt;

&lt;P&gt;[isc:bind:queryerror]&lt;BR /&gt;
REPORT-1_extract_field = isc_bind_queryerror_extract_field_0&lt;BR /&gt;
EVAL-message_type = "Response"&lt;BR /&gt;
EVAL-vendor_product = "ISC:Bind"&lt;BR /&gt;
LOOKUP-2_look_up_extract = isc_bind_severities_lookup vendor_severity OUTPUT severity&lt;BR /&gt;
LOOKUP-3_look_up_extract = isc_bind_category_lookup sourcetype OUTPUT vendor_category&lt;BR /&gt;
LOOKUP-4_look_up_extract = isc_bind_reply_code_lookup response_code OUTPUT reply_code&lt;/P&gt;

&lt;P&gt;[isc:bind:lameserver]&lt;BR /&gt;
REPORT-1_extract_field = isc_bind_lameserver_extract_field_0&lt;BR /&gt;
EVAL-app = "ISC:Bind"&lt;BR /&gt;
EVAL-type = "alert"&lt;BR /&gt;
LOOKUP-2_look_up_extract = isc_bind_severities_lookup vendor_severity OUTPUT severity&lt;BR /&gt;
LOOKUP-3_look_up_extract = isc_bind_category_lookup sourcetype OUTPUT vendor_category&lt;/P&gt;

&lt;P&gt;[isc:bind:network]&lt;BR /&gt;
REPORT-1_extract_field = isc_bind_network_extract_field_0&lt;BR /&gt;
REPORT-3_extract_field = isc_bind_network_extract_field_2&lt;BR /&gt;
EVAL-ip = CASE(match(ip, "::"), "127.0.0.1", match(ip, ".*"), ip)&lt;BR /&gt;
LOOKUP-4_look_up_extract = isc_bind_severities_lookup vendor_severity OUTPUT severity&lt;BR /&gt;
LOOKUP-5_look_up_extract = isc_bind_category_lookup sourcetype OUTPUT vendor_category&lt;BR /&gt;
LOOKUP-6_look_up_extract = isc_bind_action_lookup vendor_action OUTPUT action&lt;/P&gt;

&lt;P&gt;[isc:bind:transfer]&lt;BR /&gt;
REPORT-1_extract_field = isc_bind_transfer_extract_field_0&lt;BR /&gt;
REPORT-3_extract_field = isc_bind_transfer_extract_field_2&lt;BR /&gt;
REPORT-5_extract_field = isc_bind_transfer_extract_field_4&lt;BR /&gt;
REPORT-7_extract_field = isc_bind_transfer_extract_field_6&lt;BR /&gt;
EVAL-message_type = CASE(match(vendor_action, "sending notifies|sending notify to|notify to"), "Query", match(vendor_action, "notify response from"), "Response")&lt;BR /&gt;
EVAL-query_type = CASE(match(vendor_action, "sending notifies|sending notify to|notify to"), "Notify")&lt;BR /&gt;
EVAL-vendor_product = "ISC:Bind"&lt;BR /&gt;
LOOKUP-8_look_up_extract = isc_bind_severities_lookup vendor_severity OUTPUT severity&lt;BR /&gt;
LOOKUP-9_look_up_extract = isc_bind_category_lookup sourcetype OUTPUT vendor_category&lt;BR /&gt;
LOOKUP-10_look_up_extract = isc_bind_action_lookup vendor_action OUTPUT action&lt;BR /&gt;
LOOKUP-11_look_up_extract = isc_bind_reply_code_lookup response_code OUTPUT reply_code&lt;/P&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;P&gt;[isc_bind_query_extract_field_0]&lt;BR /&gt;
REGEX = (?:\s+queries:)?(?:\s+([^:]+):)?\s+client\s+([\w-.:]{1,100})#(\d{1,5})(?:\s+([^)]+))?:(?:\s+view\s+[^:]+:)?\s+query:\s+(?([\w-.:]{1,100}))?\s+([^\s]+)\s+([^\s]+)\s+&lt;A href="https://community.splunk.com/%5B%5Es%5D*" target="_blank"&gt;+-&lt;/A&gt;\s+(([\w-.:]{1,100}))$&lt;BR /&gt;
FORMAT = vendor_severity::$1 src::$2 src_port::$3 query::$4 record_class::$5 record_type::$6 flag::$7 dest::$8&lt;/P&gt;

&lt;P&gt;[isc_bind_queryerror_extract_field_0]&lt;BR /&gt;
REGEX = (?:\s+query-errors:)?(?:\s+([^:]+):)?\s+client\s+([\w-.:]{1,100})#(\d{1,5}):(?:\s+view\s+[^:]+:)?\s+query\s+failed\s+(([^)]+))\s+for\s+([\w-.:]{1,100})/([^/]+)/([^\s]+)\s+at\s+([^:]+):(\d+)$&lt;BR /&gt;
FORMAT = vendor_severity::$1 src::$2 src_port::$3 response_code::$4 query::$5 record_class::$6 record_type::$7 file_name::$8 file_location::$9&lt;/P&gt;

&lt;P&gt;[isc_bind_lameserver_extract_field_0]&lt;BR /&gt;
REGEX = (?:\s+lame-servers:)?(?:\s+([^:]+):)?\s+(error\s+(([^)]+))\s+resolving\s+'([\w-.:]{1,100})/([^/]+)/([^']+)':\s+([\w-.:]{1,100})#(\d{1,5}))$&lt;BR /&gt;
FORMAT = vendor_severity::$1 body::$2 error_type::$3 query::$4 record_type::$5 record_class::$6 dest::$7 dest_port::$8&lt;/P&gt;

&lt;P&gt;[isc_bind_network_extract_field_0]&lt;BR /&gt;
REGEX = (?:\s+network:)?(?:\s+([^:]+):)?\s+(no\s+longer\s+listening\s+on)\s+(\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}|::)#(\d{1,5})$&lt;BR /&gt;
FORMAT = vendor_severity::$1 vendor_action::$2 ip::$3 port::$4&lt;/P&gt;

&lt;P&gt;[isc_bind_network_extract_field_2]&lt;BR /&gt;
REGEX = (?:\s+network:)?(?:\s+([^:]+):)?\s+(listening\s+on)\s+([^\s]+)\s+interface\s+([^,]+),\s+(\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}|::)#(\d{1,5})$&lt;BR /&gt;
FORMAT = vendor_severity::$1 vendor_action::$2 proto::$3 interface::$4 ip::$5 port::$6&lt;/P&gt;

&lt;P&gt;[isc_bind_transfer_extract_field_0]&lt;BR /&gt;
REGEX = (?:\s+notify:)?(?:\s+([^:]+):)?\s+zone\s+([^/]+)/([^:/]+)(?:/[^:]+)?:\s+(sending\s+notifies)\s+(serial\s+([^)]+))$&lt;BR /&gt;
FORMAT = vendor_severity::$1 dest_zone::$2 record_class::$3 vendor_action::$4 serial_number::$5&lt;/P&gt;

&lt;P&gt;[isc_bind_transfer_extract_field_2]&lt;BR /&gt;
REGEX = (?:\s+notify:)?(?:\s+([^:]+):)?\s+zone\s+([^/]+)/([^:/]+)(?:/[^:]+)?:\s+(sending\s+notify\s+to)\s+([\w-.:]{1,100})#(\d{1,5})$&lt;BR /&gt;
FORMAT = vendor_severity::$1 dest_zone::$2 record_class::$3 vendor_action::$4 dest::$5 dest_port::$6&lt;/P&gt;

&lt;P&gt;[isc_bind_transfer_extract_field_4]&lt;BR /&gt;
REGEX = (?:\s+notify:)?(?:\s+([^:]+):)?\s+zone\s+([^/]+)/([^:/]+)(?:/[^:]+)?:\s+(notify\s+to)\s+([\w-.:]{1,100})#(\d{1,5})(?:[^:]&lt;EM&gt;:)\s+(.&lt;/EM&gt;)$&lt;BR /&gt;
FORMAT = vendor_severity::$1 dest_zone::$2 record_class::$3 vendor_action::$4 dest::$5 dest_port::$6 detail::$7&lt;/P&gt;

&lt;P&gt;[isc_bind_transfer_extract_field_6]&lt;BR /&gt;
REGEX = (?:\s+notify:)?(?:\s+([^:]+):)?\s+zone\s+([^/]+)/([^:/]+)(?:/[^:]+)?:\s+(notify\s+response\s+from)\s+([\w-.:]{1,100})#(\d{1,5}):\s+(.*)$&lt;BR /&gt;
FORMAT = vendor_severity::$1 dest_zone::$2 record_class::$3 vendor_action::$4 src::$5 src_port::$6 response_code::$7&lt;/P&gt;

&lt;P&gt;[isc_bind_severities_lookup]&lt;BR /&gt;
filename = isc_bind_severities.csv&lt;/P&gt;

&lt;P&gt;[isc_bind_category_lookup]&lt;BR /&gt;
filename = isc_bind_category.csv&lt;/P&gt;

&lt;P&gt;[isc_bind_reply_code_lookup]&lt;BR /&gt;
filename = isc_bind_reply_code.csv&lt;/P&gt;

&lt;P&gt;[isc_bind_action_lookup]&lt;BR /&gt;
filename = isc_bind_action.csv&lt;/P&gt;

&lt;P&gt;Thanks in advance &lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 19:48:01 GMT</pubDate>
    <dc:creator>sumitkathpal</dc:creator>
    <dc:date>2020-09-29T19:48:01Z</dc:date>
    <item>
      <title>Defining the multiple source type from single file (we are using the add-on Splunk Add-on for ISC BIND)</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Defining-the-multiple-source-type-from-single-file-we-are-using/m-p/433594#M53223</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;As per Splunk Add-on for ISC BIND dns query and dns errors logs should be in different file however we have single file which has query and error logs together .&lt;/P&gt;

&lt;P&gt;Issue is what sourcetype should we define so that sourcetype are tagged based on the query or error logs.&lt;/P&gt;

&lt;P&gt;Current scenario :&lt;BR /&gt;
query logs and error logs are written into single file . Let's say dns.logs&lt;/P&gt;

&lt;P&gt;Now in &lt;STRONG&gt;input.conf&lt;/STRONG&gt; on Heavy Forwader&lt;/P&gt;

&lt;P&gt;[monitor:///opt/syslog-data/dnsserver/dns.log]&lt;BR /&gt;
host_regex = .&lt;EM&gt;\/(.&lt;/EM&gt;)\/\d\d\d\d-\d\d-\d\d.log&lt;BR /&gt;
sourcetype =  &lt;STRONG&gt;[what sourcetype should i define here ]&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt; &lt;/P&gt;

&lt;P&gt;[isc:bind:query]&lt;BR /&gt;
REPORT-1_extract_field = isc_bind_query_extract_field_0&lt;BR /&gt;
EVAL-message_type = "Query"&lt;BR /&gt;
EVAL-query_type = "Query"&lt;BR /&gt;
EVAL-vendor_product = "ISC:Bind"&lt;BR /&gt;
LOOKUP-2_look_up_extract = isc_bind_severities_lookup vendor_severity OUTPUT severity&lt;BR /&gt;
LOOKUP-3_look_up_extract = isc_bind_category_lookup sourcetype OUTPUT vendor_category&lt;/P&gt;

&lt;P&gt;[isc:bind:queryerror]&lt;BR /&gt;
REPORT-1_extract_field = isc_bind_queryerror_extract_field_0&lt;BR /&gt;
EVAL-message_type = "Response"&lt;BR /&gt;
EVAL-vendor_product = "ISC:Bind"&lt;BR /&gt;
LOOKUP-2_look_up_extract = isc_bind_severities_lookup vendor_severity OUTPUT severity&lt;BR /&gt;
LOOKUP-3_look_up_extract = isc_bind_category_lookup sourcetype OUTPUT vendor_category&lt;BR /&gt;
LOOKUP-4_look_up_extract = isc_bind_reply_code_lookup response_code OUTPUT reply_code&lt;/P&gt;

&lt;P&gt;[isc:bind:lameserver]&lt;BR /&gt;
REPORT-1_extract_field = isc_bind_lameserver_extract_field_0&lt;BR /&gt;
EVAL-app = "ISC:Bind"&lt;BR /&gt;
EVAL-type = "alert"&lt;BR /&gt;
LOOKUP-2_look_up_extract = isc_bind_severities_lookup vendor_severity OUTPUT severity&lt;BR /&gt;
LOOKUP-3_look_up_extract = isc_bind_category_lookup sourcetype OUTPUT vendor_category&lt;/P&gt;

&lt;P&gt;[isc:bind:network]&lt;BR /&gt;
REPORT-1_extract_field = isc_bind_network_extract_field_0&lt;BR /&gt;
REPORT-3_extract_field = isc_bind_network_extract_field_2&lt;BR /&gt;
EVAL-ip = CASE(match(ip, "::"), "127.0.0.1", match(ip, ".*"), ip)&lt;BR /&gt;
LOOKUP-4_look_up_extract = isc_bind_severities_lookup vendor_severity OUTPUT severity&lt;BR /&gt;
LOOKUP-5_look_up_extract = isc_bind_category_lookup sourcetype OUTPUT vendor_category&lt;BR /&gt;
LOOKUP-6_look_up_extract = isc_bind_action_lookup vendor_action OUTPUT action&lt;/P&gt;

&lt;P&gt;[isc:bind:transfer]&lt;BR /&gt;
REPORT-1_extract_field = isc_bind_transfer_extract_field_0&lt;BR /&gt;
REPORT-3_extract_field = isc_bind_transfer_extract_field_2&lt;BR /&gt;
REPORT-5_extract_field = isc_bind_transfer_extract_field_4&lt;BR /&gt;
REPORT-7_extract_field = isc_bind_transfer_extract_field_6&lt;BR /&gt;
EVAL-message_type = CASE(match(vendor_action, "sending notifies|sending notify to|notify to"), "Query", match(vendor_action, "notify response from"), "Response")&lt;BR /&gt;
EVAL-query_type = CASE(match(vendor_action, "sending notifies|sending notify to|notify to"), "Notify")&lt;BR /&gt;
EVAL-vendor_product = "ISC:Bind"&lt;BR /&gt;
LOOKUP-8_look_up_extract = isc_bind_severities_lookup vendor_severity OUTPUT severity&lt;BR /&gt;
LOOKUP-9_look_up_extract = isc_bind_category_lookup sourcetype OUTPUT vendor_category&lt;BR /&gt;
LOOKUP-10_look_up_extract = isc_bind_action_lookup vendor_action OUTPUT action&lt;BR /&gt;
LOOKUP-11_look_up_extract = isc_bind_reply_code_lookup response_code OUTPUT reply_code&lt;/P&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;P&gt;[isc_bind_query_extract_field_0]&lt;BR /&gt;
REGEX = (?:\s+queries:)?(?:\s+([^:]+):)?\s+client\s+([\w-.:]{1,100})#(\d{1,5})(?:\s+([^)]+))?:(?:\s+view\s+[^:]+:)?\s+query:\s+(?([\w-.:]{1,100}))?\s+([^\s]+)\s+([^\s]+)\s+&lt;A href="https://community.splunk.com/%5B%5Es%5D*" target="_blank"&gt;+-&lt;/A&gt;\s+(([\w-.:]{1,100}))$&lt;BR /&gt;
FORMAT = vendor_severity::$1 src::$2 src_port::$3 query::$4 record_class::$5 record_type::$6 flag::$7 dest::$8&lt;/P&gt;

&lt;P&gt;[isc_bind_queryerror_extract_field_0]&lt;BR /&gt;
REGEX = (?:\s+query-errors:)?(?:\s+([^:]+):)?\s+client\s+([\w-.:]{1,100})#(\d{1,5}):(?:\s+view\s+[^:]+:)?\s+query\s+failed\s+(([^)]+))\s+for\s+([\w-.:]{1,100})/([^/]+)/([^\s]+)\s+at\s+([^:]+):(\d+)$&lt;BR /&gt;
FORMAT = vendor_severity::$1 src::$2 src_port::$3 response_code::$4 query::$5 record_class::$6 record_type::$7 file_name::$8 file_location::$9&lt;/P&gt;

&lt;P&gt;[isc_bind_lameserver_extract_field_0]&lt;BR /&gt;
REGEX = (?:\s+lame-servers:)?(?:\s+([^:]+):)?\s+(error\s+(([^)]+))\s+resolving\s+'([\w-.:]{1,100})/([^/]+)/([^']+)':\s+([\w-.:]{1,100})#(\d{1,5}))$&lt;BR /&gt;
FORMAT = vendor_severity::$1 body::$2 error_type::$3 query::$4 record_type::$5 record_class::$6 dest::$7 dest_port::$8&lt;/P&gt;

&lt;P&gt;[isc_bind_network_extract_field_0]&lt;BR /&gt;
REGEX = (?:\s+network:)?(?:\s+([^:]+):)?\s+(no\s+longer\s+listening\s+on)\s+(\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}|::)#(\d{1,5})$&lt;BR /&gt;
FORMAT = vendor_severity::$1 vendor_action::$2 ip::$3 port::$4&lt;/P&gt;

&lt;P&gt;[isc_bind_network_extract_field_2]&lt;BR /&gt;
REGEX = (?:\s+network:)?(?:\s+([^:]+):)?\s+(listening\s+on)\s+([^\s]+)\s+interface\s+([^,]+),\s+(\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}|::)#(\d{1,5})$&lt;BR /&gt;
FORMAT = vendor_severity::$1 vendor_action::$2 proto::$3 interface::$4 ip::$5 port::$6&lt;/P&gt;

&lt;P&gt;[isc_bind_transfer_extract_field_0]&lt;BR /&gt;
REGEX = (?:\s+notify:)?(?:\s+([^:]+):)?\s+zone\s+([^/]+)/([^:/]+)(?:/[^:]+)?:\s+(sending\s+notifies)\s+(serial\s+([^)]+))$&lt;BR /&gt;
FORMAT = vendor_severity::$1 dest_zone::$2 record_class::$3 vendor_action::$4 serial_number::$5&lt;/P&gt;

&lt;P&gt;[isc_bind_transfer_extract_field_2]&lt;BR /&gt;
REGEX = (?:\s+notify:)?(?:\s+([^:]+):)?\s+zone\s+([^/]+)/([^:/]+)(?:/[^:]+)?:\s+(sending\s+notify\s+to)\s+([\w-.:]{1,100})#(\d{1,5})$&lt;BR /&gt;
FORMAT = vendor_severity::$1 dest_zone::$2 record_class::$3 vendor_action::$4 dest::$5 dest_port::$6&lt;/P&gt;

&lt;P&gt;[isc_bind_transfer_extract_field_4]&lt;BR /&gt;
REGEX = (?:\s+notify:)?(?:\s+([^:]+):)?\s+zone\s+([^/]+)/([^:/]+)(?:/[^:]+)?:\s+(notify\s+to)\s+([\w-.:]{1,100})#(\d{1,5})(?:[^:]&lt;EM&gt;:)\s+(.&lt;/EM&gt;)$&lt;BR /&gt;
FORMAT = vendor_severity::$1 dest_zone::$2 record_class::$3 vendor_action::$4 dest::$5 dest_port::$6 detail::$7&lt;/P&gt;

&lt;P&gt;[isc_bind_transfer_extract_field_6]&lt;BR /&gt;
REGEX = (?:\s+notify:)?(?:\s+([^:]+):)?\s+zone\s+([^/]+)/([^:/]+)(?:/[^:]+)?:\s+(notify\s+response\s+from)\s+([\w-.:]{1,100})#(\d{1,5}):\s+(.*)$&lt;BR /&gt;
FORMAT = vendor_severity::$1 dest_zone::$2 record_class::$3 vendor_action::$4 src::$5 src_port::$6 response_code::$7&lt;/P&gt;

&lt;P&gt;[isc_bind_severities_lookup]&lt;BR /&gt;
filename = isc_bind_severities.csv&lt;/P&gt;

&lt;P&gt;[isc_bind_category_lookup]&lt;BR /&gt;
filename = isc_bind_category.csv&lt;/P&gt;

&lt;P&gt;[isc_bind_reply_code_lookup]&lt;BR /&gt;
filename = isc_bind_reply_code.csv&lt;/P&gt;

&lt;P&gt;[isc_bind_action_lookup]&lt;BR /&gt;
filename = isc_bind_action.csv&lt;/P&gt;

&lt;P&gt;Thanks in advance &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 19:48:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Defining-the-multiple-source-type-from-single-file-we-are-using/m-p/433594#M53223</guid>
      <dc:creator>sumitkathpal</dc:creator>
      <dc:date>2020-09-29T19:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: Defining the multiple source type from single file (we are using the add-on Splunk Add-on for ISC BIND)</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Defining-the-multiple-source-type-from-single-file-we-are-using/m-p/433595#M53224</link>
      <description>&lt;P&gt;Help required @elliotproebstel&lt;/P&gt;</description>
      <pubDate>Sun, 03 Jun 2018 03:12:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Defining-the-multiple-source-type-from-single-file-we-are-using/m-p/433595#M53224</guid>
      <dc:creator>sumitkathpal</dc:creator>
      <dc:date>2018-06-03T03:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: Defining the multiple source type from single file (we are using the add-on Splunk Add-on for ISC BIND)</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Defining-the-multiple-source-type-from-single-file-we-are-using/m-p/433596#M53225</link>
      <description>&lt;P&gt;Help................&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 11:53:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Defining-the-multiple-source-type-from-single-file-we-are-using/m-p/433596#M53225</guid>
      <dc:creator>sumitkathpal</dc:creator>
      <dc:date>2018-06-05T11:53:47Z</dc:date>
    </item>
  </channel>
</rss>

