<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows DNS debug logs TA not using CIM fields? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115802#M8607</link>
    <description>&lt;P&gt;Any updates yet? it's been well over 2 years?&lt;/P&gt;</description>
    <pubDate>Tue, 02 Jan 2018 11:02:18 GMT</pubDate>
    <dc:creator>kevinmanson</dc:creator>
    <dc:date>2018-01-02T11:02:18Z</dc:date>
    <item>
      <title>Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115779#M8584</link>
      <description>&lt;P&gt;I set up a test environment with a Windows 2012 R2 server with the DNS server role, and was able to successfully install TA-DNSServer-NT6 (as per the instructions at &lt;A href="http://docs.splunk.com/Documentation/MSApp/1.1.2/MSInfra/DownloadandconfiguretheSplunkAdd-onsforWindowsDNS"&gt;http://docs.splunk.com/Documentation/MSApp/1.1.2/MSInfra/DownloadandconfiguretheSplunkAdd-onsforWindowsDNS&lt;/A&gt; ).&lt;/P&gt;

&lt;P&gt;However, I was very surprised to discover two things:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;The DNS packet data (which contains the actual replies, such as the IP addresses a hostname resolved to in a A query) was not being parsed, and in fact generated "incomplete" alerts with each packet line as in this example:&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/362i450E15414113F951/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;The summary lines were being correctly parsed, but the corresponding CIM fields (&lt;A href="http://docs.splunk.com/Documentation/CIM/4.2.0/User/NetworkResolutionDNS"&gt;http://docs.splunk.com/Documentation/CIM/4.2.0/User/NetworkResolutionDNS&lt;/A&gt; ) were not extracted. For example, a query for &lt;CODE&gt;tag=dns&lt;/CODE&gt; came up empty even though there are DNS events and the Splunk App for Windows Infrastructure "DNS: Top Requested Queries" report is being populated. Here is an example:&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/363iD111861D0EBE35DE/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;For one, I would have expected to see tags with &lt;CODE&gt;network&lt;/CODE&gt;, &lt;CODE&gt;resolution&lt;/CODE&gt; and &lt;CODE&gt;dns&lt;/CODE&gt; values as per the CIM documentation.&lt;/P&gt;

&lt;P&gt;Can anyone else with a working installation of the DNS debug log collection confirm whether this field is populated for them? Did I make some mistake in the setup or is this a limitation of the app?&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2015 18:14:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115779#M8584</guid>
      <dc:creator>asieira</dc:creator>
      <dc:date>2015-05-20T18:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115780#M8585</link>
      <description>&lt;P&gt;So it turns out that the latest available version of the &lt;A href="https://splunkbase.splunk.com/app/1680/"&gt;app&lt;/A&gt; claims support to CIM 4.0. And the Network Resolution (DNS) data model didn't show up until &lt;A href="http://docs.splunk.com/Documentation/CIM/4.1.0/User/Releasenotes"&gt;CIM 4.1.0&lt;/A&gt; was released around 6 months ago.&lt;/P&gt;

&lt;P&gt;So apparently it's a documented current limitation of the app. Oh, well.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2015 14:59:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115780#M8585</guid>
      <dc:creator>asieira</dc:creator>
      <dc:date>2015-06-24T14:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115781#M8586</link>
      <description>&lt;P&gt;Perhaps time for someone to update the app ...&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 10:11:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115781#M8586</guid>
      <dc:creator>mikaelbje</dc:creator>
      <dc:date>2015-08-19T10:11:47Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115782#M8587</link>
      <description>&lt;P&gt;Updated 2019-11-27 to account for _carddavs_.tcp.(null) possibility.&lt;BR /&gt;
Tested with Splunk Add-on for Windows 7.0.0 and Splunk version 8.0.&lt;/P&gt;

&lt;P&gt;I'm answering this thread because I will eventually need this myself.&lt;/P&gt;

&lt;P&gt;The current limitations I've identified that I'm attempting to fix:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;CIM compliance&lt;/LI&gt;
&lt;LI&gt;Normalization of the query name to get rid of the (4)imap(5)gmail(3)com(0) ugliness&lt;/LI&gt;
&lt;LI&gt;IPv6 addresses are not populated in src&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Add these additions to your &lt;STRONG&gt;Splunk_TA_windows&lt;/STRONG&gt; directory. You need to deploy this to your Indexer and Search Head.&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;local/tags.conf:&lt;/LI&gt;
&lt;/UL&gt;

&lt;PRE&gt;[eventtype=nt6-dns-events]
dns = enabled
network = enabled
resolution = enabled&lt;/PRE&gt;
    
* local/props.conf:

&lt;PRE&gt;
[MSAD:NT6:DNS]
# Index-time Normalization of the query name
# Example 1: (3)www(6)google(3)com(0) becomes www.google.com
# Example 2: (9)_carddavs(4)_tcp(6)(null)(0) becomes _carddavs._tcp(null)
#
SEDCMD-win_dns = s/(\\(\d+\\))/./g s/(\\.)$// s/\s(\\.)/ /
# I don't know if MS DNS is Query or Response, so I set both
EVAL-message_type = mvappend("QUERY","RESPONSE")
FIELDALIAS-message_type = questiontype AS record_type
FIELDALIAS-vendor_query_type = opcode AS vendor_query_type
LOOKUP-dns_query_type_lookup = msad_dns_vendor_query_type_lookup vendor_query_type OUTPUT query_type&lt;/PRE&gt;
    
* local/transforms.conf:

&lt;PRE&gt;# Reference: tools .ietf.org/html/rfc2929#section-2.2 
[msad_dns_vendor_query_type_lookup]
filename = dns_vendor_query_type_lookup.csv
# IP version agnostic src
[KV_for_RecvdIP]
REGEX = (Snd|Rcv)\s+((?:(?:\d{1,3}\\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\\.]+)?(?:::)?)|(?:::[\dA-Fa-f\\.]{1,15})|(?:::))
FORMAT = src::$2
#
[KV_for_Domain]
REGEX = \\.([a-zA-Z0-9\\-\\_]+\\.[a-zA-Z0-9\\-\\_]+)$
FORMAT = src_domain::$1
&lt;/PRE&gt;
    

&lt;UL&gt;
&lt;LI&gt;lookups/dns_vendor_query_type_lookup.csv:&lt;/LI&gt;
&lt;/UL&gt;

&lt;PRE&gt;vendor_query_type,query_type
Q,Query
N,Notify
U,Update
?,unknown&lt;/PRE&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:02:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115782#M8587</guid>
      <dc:creator>mikaelbje</dc:creator>
      <dc:date>2020-09-29T07:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115783#M8588</link>
      <description>&lt;P&gt;Turns out that fixing the "ugly" hostnames as generated in Windows DNS debug logs is unfortunately not as simple as the regex replace you implemented there.&lt;/P&gt;

&lt;P&gt;First of all, sometimes they contain pointers in brackets that we also need to get rid of: &lt;A href="http://stackoverflow.com/questions/20381717/windows-dns-server-debug-log-hostname-format"&gt;http://stackoverflow.com/questions/20381717/windows-dns-server-debug-log-hostname-format&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Second, parenthesis are valid characters inside domain/host names. So it might be that a valid occurrence of a number inside parenthesis will be incorrectly replaced by a dot. One example of an actual use of parenthesis (though not with numbers inside) that is rather common in Windows networks is the following: &lt;CODE&gt;(9)_carddavs(4)_tcp(6)(null)(0)&lt;/CODE&gt; which should be converted to &lt;CODE&gt;_carddavs._tcp.(null)&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;So the only viable solution that will always work is to actually write code that treats the numbers in parenthesis as what they really are - the length of each dot-separated string that makes up the domain/host name in question. Maybe an external command implementation in Python is in order here.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 13:34:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115783#M8588</guid>
      <dc:creator>asieira</dc:creator>
      <dc:date>2015-08-20T13:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115784#M8589</link>
      <description>&lt;P&gt;we filed a bug and this will be prioritized into the dev queue. thanks for bringing this to our attention!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2015 14:34:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115784#M8589</guid>
      <dc:creator>mreynov_splunk</dc:creator>
      <dc:date>2015-08-21T14:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115785#M8590</link>
      <description>&lt;P&gt;Bummer. I'd never seen a DNS record with a (null) value before, so discard the &lt;CODE&gt;SEDCMD-win_dns = s/\(\d+\)/./g&lt;/CODE&gt; attribute from the props.conf. I wonder how Enterprise Security Suite reacts to these funky looking records in Windows DNS logs.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 11:46:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115785#M8590</guid>
      <dc:creator>mikaelbje</dc:creator>
      <dc:date>2015-08-24T11:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115786#M8591</link>
      <description>&lt;P&gt;Mikealbje, I just implemented this workaround in our Splunk instance. Thank you! This just saved me hours of work!&lt;/P&gt;

&lt;P&gt;BTW, I had to fix a typo - the stanza in transforms.conf:&lt;BR /&gt;
[msad_dns_vendor_query_type_lookup]&lt;BR /&gt;
should be:&lt;BR /&gt;
[dns_vendor_query_type_lookup]&lt;/P&gt;

&lt;P&gt;Another modification I made to your method was copying the default DNSServer-NT6 TA to a custom TA "DNSServer-NT6_cimfix", implementing your fixes, and deleting the default/inputs.conf. I have the original vanilla DNSServer-NT6 TA pushing down to the AD boxes for log collection, and the DNSServer-NT6_cimfix band-aid version of the TA pushing to the search head and indexer for index-time and search-time field extraction.&lt;/P&gt;

&lt;P&gt;The extractions look like they're working. Just waiting on Network Sessions (DNS) data model acceleration to rebuild and the DNS ES dashboard should be open for business.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:51:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115786#M8591</guid>
      <dc:creator>fharding</dc:creator>
      <dc:date>2020-09-29T07:51:04Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115787#M8592</link>
      <description>&lt;P&gt;Darn - I spoke too soon. Looks the searches behind the panels in the ES dashboard want more fields. Going to see how much work will be involved in normalizing this data source further. Best option might just be to let the Splunk devs do the work and wait for an official update to the TA.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2015 00:26:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115787#M8592</guid>
      <dc:creator>fharding</dc:creator>
      <dc:date>2015-11-10T00:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115788#M8593</link>
      <description>&lt;P&gt;Btw there's a new community add-on for Windows DNS logs. It uses a new method to get the logs and claims to be CIM compliant. I haven't been able to test it yet. Look it up on Splunkbase and let me know if it works &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2015 05:31:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115788#M8593</guid>
      <dc:creator>mikaelbje</dc:creator>
      <dc:date>2015-11-10T05:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115789#M8594</link>
      <description>&lt;P&gt;Do you have a link for it? Might be helpful for people that read this thread later on.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2015 11:19:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115789#M8594</guid>
      <dc:creator>asieira</dc:creator>
      <dc:date>2015-11-10T11:19:37Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115790#M8595</link>
      <description>&lt;P&gt;Are you talking about this one?&lt;/P&gt;

&lt;P&gt;&lt;A href="https://splunkbase.splunk.com/app/2937/"&gt;https://splunkbase.splunk.com/app/2937/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;If so, I'm curious if it works with Server 2008 flavors. Says it's built for 2012r2 and up.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2015 17:11:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115790#M8595</guid>
      <dc:creator>fharding</dc:creator>
      <dc:date>2015-11-10T17:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115791#M8596</link>
      <description>&lt;P&gt;That's the one. Untested by me, but claims to be CIM compliant.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2015 05:26:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115791#M8596</guid>
      <dc:creator>mikaelbje</dc:creator>
      <dc:date>2015-11-11T05:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115792#M8597</link>
      <description>&lt;P&gt;That might be an alternative, yes. Just keep in mind it's not using the DNS debug logs though, instead it uses new DNS logging functionality Microsoft introduced in 2012r2.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2015 11:58:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115792#M8597</guid>
      <dc:creator>asieira</dc:creator>
      <dc:date>2015-11-11T11:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115793#M8598</link>
      <description>&lt;P&gt;For many of these reasons we didn't use this method at all but instead deployed the &lt;A href="https://splunkbase.splunk.com/app/1809/"&gt;Splunk App for Stream&lt;/A&gt; and used that to sniff DNS packets from the DNS servers.  This is also how we're getting DHCP packets in.  &lt;/P&gt;

&lt;P&gt;It may be an option for you as well.  It is a bit of work getting it set up and running, but far less work than you've already put into fixing the DNS logs from MS.  Because we're selectively only pulling in DNS and DHCP, I believe it's the same license hit as using the logs would be. &lt;/P&gt;

&lt;P&gt;Note: a prerequisite is having winpcap libraries installed because the stream app uses winpcap on the clients to actually sniff the packets, and IIRC the docs aren't as clear as they could be on that.  But, that's a small, fast, easy install.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2015 13:17:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115793#M8598</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2015-11-11T13:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115794#M8599</link>
      <description>&lt;P&gt;Any updates on this?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2016 23:57:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115794#M8599</guid>
      <dc:creator>asieira</dc:creator>
      <dc:date>2016-03-11T23:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115795#M8600</link>
      <description>&lt;P&gt;@rich7177 is there any walkthrough or tutorial posted anywhere on how to collect DNS data using Splunk App for Stream? Also, would you mind sharing what the DNS events look like (extracted fields, tags, etc)?&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 12:52:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115795#M8600</guid>
      <dc:creator>asieira</dc:creator>
      <dc:date>2016-08-05T12:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115796#M8601</link>
      <description>&lt;P&gt;Ryan wrote up a quick an dirty walkthrough on using &lt;A href="https://answers.splunk.com/answers/236821/windows-dns-debug-logs-ta-not-using-cim-fields.html#comment-439330"&gt;Stream for DNS&lt;/A&gt;.  You can also find a handful of things in &lt;A href="http://docs.splunk.com/Documentation/StreamApp/6.5.1/DeployStreamApp/StreamConfigurationbasics"&gt;the docs&lt;/A&gt; and in the &lt;A href="http://blogs.splunk.com/tag/dns/"&gt;splunk blogs&lt;/A&gt; to help.  Ask if you get stuck - there are some slightly "sticky" places in the setup.  BTW, you will need the winpcap libraries installed (Wireshark installs them when you install it, and they're available separately).&lt;/P&gt;

&lt;P&gt;All the following is extracted properly - stream grabs the packets off the wire and converts them to json to send in, so all these are fields properly parsed (Splunk likes JSON... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ).  The hosts and other multi-value fields are, when multi-valued, correctly done as multi-value fields.  Umm, sorry, that was redundant, eh?  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; { [-]
   bytes: 444
   bytes_in: 170
   bytes_out: 274
   dest_ip: 208.67.220.220
   dest_mac: 54:75:D0:BC:7E:C0
   dest_port: 53
   endtime: 2016-08-05T13:53:50.457144Z
   host_type: [ [+]
   ]
   message_type: QUERY
   name: 0108cd802801.t-1470405234.i9b462034.a3dad853f144547d6c20bd57d087602b-631-jpg.a3dad853f144547d6c20bd57d087602b-631-jpg.fp.bl.barracudabrts.com
   query: 0108cd802801.t-1470405234.i9b462034.a3dad853f144547d6c20bd57d087602b-631-jpg.a3dad853f144547d6c20bd57d087602b-631-jpg.fp.bl.barracudabrts.com
   query_type: TXT
   reply_code: NoError
   response_time: 105989
   src_ip: 10.134.0.232
   src_mac: 00:50:56:88:04:E9
   src_port: 62794
   time_taken: 105989
   timestamp: 2016-08-05T13:53:50.351155Z
   transaction_id: 54234
   transport: udp
   ttl: [ [+]
   ]
} 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It really is a superior way.  It may be a bit more work to get working, but then has SO much more capability making it worth it.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 14:02:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115796#M8601</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2016-08-05T14:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115797#M8602</link>
      <description>&lt;P&gt;That's awesome, thank you for providing the additional details.&lt;/P&gt;

&lt;P&gt;Will the JSON include all RRs in a response packet?&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 14:05:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115797#M8602</guid>
      <dc:creator>asieira</dc:creator>
      <dc:date>2016-08-05T14:05:34Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS debug logs TA not using CIM fields?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115798#M8603</link>
      <description>&lt;P&gt;Yep, the one I STARTED pasting was a bit messier, being something on Amazon with 8 responses.  It was a bit messier to look at though, so I picked a simpler response for illustrative purposes. All came through as a multi-valued field and "just works".&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 14:07:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-DNS-debug-logs-TA-not-using-CIM-fields/m-p/115798#M8603</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2016-08-05T14:07:16Z</dc:date>
    </item>
  </channel>
</rss>

