<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue Parsing Windows DNS Logs in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562950#M100301</link>
    <description>&lt;P&gt;I have completely removed the props.conf from UF.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I have the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;An inputs.conf file on the UF as shown below:&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[monitor://c:\windows\system32\dns\dns.log]
disabled = 0
index = dns
sourcetype = windows:dns&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;An outputs.conf file on the UF (not shown as it is not relevant to this discussion).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;A modified the props.conf on the HF to reflect the following (as you recommended):&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[windows:dns]
SHOULD_LINEMERGE=false
LINE_BREAKER=([\r\n]+)\d+\/\d+\/\d+\s+\d+:\d+:\d+
NO_BINARY_CHECK=true
TIME_PREFIX=^
TIME_FORMAT=%m/%d/%Y %H:%M:%S %p&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Within Splunk Cloud&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I have the following configuration for "calculated fields".&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15499i052D7CEFF7BF0C67/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The following for "field extractions".&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15500i4B24F737FA0E8105/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The following for field transformations:&lt;/LI&gt;&lt;/UL&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15501i2416A49207E1B6D1/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15502i3868C602B2100D74/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15504iF4D8866F464D4C8C/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15506iC0B5CCBA2AE25146/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15507i03064AC9E5476823/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The following reports:&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15509i5621938CB5F02690/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This results in the following fields being parsed:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 160px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15531iC8703E4358DFFD5F/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;AND&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 153px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15532iDB6D15D2C777D7F0/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I am however, not able to parse the following:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 417px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15533i0C64BC79E8317881/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Aug 2021 14:57:05 GMT</pubDate>
    <dc:creator>qcjacobo2577</dc:creator>
    <dc:date>2021-08-11T14:57:05Z</dc:date>
    <item>
      <title>Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562795#M100288</link>
      <description>&lt;P&gt;Hoping someone can help here....&lt;/P&gt;
&lt;P&gt;We are currently running DNS services on our Windows Active Directory servers (we do not currently have tools/tech in place to stream or otherwise capture this data on the wire --- roadmap item).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are also running on Splunk Cloud with a Splunk HF (installed on a dedicated stand-alone system) &amp;amp; Splunk UF (installed on the Active Directory server(s) with DNS services running).&amp;nbsp; So the data flows as follows:&lt;/P&gt;
&lt;P&gt;Splunk UF (AD Server) -&amp;gt; Splunk HF (dedicated box) -&amp;gt; Splunk Cloud&lt;/P&gt;
&lt;P&gt;Using this approach, I am able to successfully get the data in to Splunk Cloud.&amp;nbsp; My issue revolves around parsing the necessary fields.&amp;nbsp; I am most concerned about getting the DNS entry itself (as part of the initial query) as well as the IP address returned in the DNS response.&amp;nbsp; Below I have included the raw data, the inputs.conf, props.conf, and transforms.conf.&amp;nbsp; Please let me know what I am missing as I am at a loss at this point.&lt;/P&gt;
&lt;P&gt;========&lt;/P&gt;
&lt;P&gt;=======&lt;/P&gt;
&lt;P&gt;======DNS Query Raw Data======&lt;/P&gt;
&lt;P&gt;8/9/2021 7:19:32 AM 1750 PACKET 00000200616CA100 UDP Rcv ::1 1bf5 Q [0001 D NOERROR] A (27)vm3-proxy-pta-NCUS-CHI01P-2(9)connector(3)his(10)msappproxy(3)net(0)&lt;BR /&gt;UDP question info at 00000200616CA100&lt;BR /&gt;Socket = 828&lt;BR /&gt;Remote addr ::1, port 62839&lt;BR /&gt;Time Query=229843, Queued=0, Expire=0&lt;BR /&gt;Buf length = 0x0fa0 (4000)&lt;BR /&gt;Msg length = 0x004a (74)&lt;BR /&gt;Message:&lt;BR /&gt;XID 0x1bf5&lt;BR /&gt;Flags 0x0100&lt;BR /&gt;QR 0 (QUESTION)&lt;BR /&gt;OPCODE 0 (QUERY)&lt;BR /&gt;AA 0&lt;BR /&gt;TC 0&lt;BR /&gt;RD 1&lt;BR /&gt;RA 0&lt;BR /&gt;Z 0&lt;BR /&gt;CD 0&lt;BR /&gt;AD 0&lt;BR /&gt;RCODE 0 (NOERROR)&lt;BR /&gt;QCOUNT 1&lt;BR /&gt;ACOUNT 0&lt;BR /&gt;NSCOUNT 0&lt;BR /&gt;ARCOUNT 0&lt;BR /&gt;QUESTION SECTION:&lt;BR /&gt;Offset = 0x000c, RR count = 0&lt;BR /&gt;QTYPE A (1)&lt;BR /&gt;QCLASS 1&lt;BR /&gt;ANSWER SECTION:&lt;BR /&gt;empty&lt;BR /&gt;AUTHORITY SECTION:&lt;BR /&gt;empty&lt;BR /&gt;ADDITIONAL SECTION:&lt;BR /&gt;empty&lt;/P&gt;
&lt;P&gt;======DNS Response Raw Data======&lt;/P&gt;
&lt;P&gt;8/9/2021 7:19:10 AM 1750 PACKET 000002006188FCC0 UDP Snd ::1 196c R Q [8081 DR NOERROR] A (27)vm3-proxy-pta-NCUS-CHI01P-2(9)connector(3)his(10)msappproxy(3)net(0)&lt;BR /&gt;UDP response info at 000002006188FCC0&lt;BR /&gt;Socket = 828&lt;BR /&gt;Remote addr ::1, port 58618&lt;BR /&gt;Time Query=229821, Queued=229822, Expire=229825&lt;BR /&gt;Buf length = 0x0200 (512)&lt;BR /&gt;Msg length = 0x00bb (187)&lt;BR /&gt;Message:&lt;BR /&gt;XID 0x196c&lt;BR /&gt;Flags 0x8180&lt;BR /&gt;QR 1 (RESPONSE)&lt;BR /&gt;OPCODE 0 (QUERY)&lt;BR /&gt;AA 0&lt;BR /&gt;TC 0&lt;BR /&gt;RD 1&lt;BR /&gt;RA 1&lt;BR /&gt;Z 0&lt;BR /&gt;CD 0&lt;BR /&gt;AD 0&lt;BR /&gt;RCODE 0 (NOERROR)&lt;BR /&gt;QCOUNT 1&lt;BR /&gt;ACOUNT 2&lt;BR /&gt;NSCOUNT 0&lt;BR /&gt;ARCOUNT 0&lt;BR /&gt;QUESTION SECTION:&lt;BR /&gt;Offset = 0x000c, RR count = 0&lt;BR /&gt;QTYPE A (1)&lt;BR /&gt;QCLASS 1&lt;BR /&gt;ANSWER SECTION:&lt;BR /&gt;Offset = 0x004a, RR count = 0&lt;BR /&gt;TYPE CNAME (5)&lt;BR /&gt;CLASS 1&lt;BR /&gt;TTL 241&lt;BR /&gt;DLEN 85&lt;BR /&gt;DATA Offset = 0x00ab, RR count = 1&lt;BR /&gt;TYPE A (1)&lt;BR /&gt;CLASS 1&lt;BR /&gt;TTL 7&lt;BR /&gt;DLEN 4&lt;BR /&gt;DATA 20.80.38.248&lt;BR /&gt;AUTHORITY SECTION:&lt;BR /&gt;empty&lt;BR /&gt;ADDITIONAL SECTION:&lt;BR /&gt;Empty&lt;/P&gt;
&lt;P&gt;======UF inputs.conf======&lt;/P&gt;
&lt;P&gt;[monitor://c:\windows\system32\dns\dns.log]&lt;BR /&gt;disabled = 0&lt;BR /&gt;index = dns&lt;BR /&gt;sourcetype = windows:dns&lt;/P&gt;
&lt;P&gt;======UF props.conf======&lt;/P&gt;
&lt;P&gt;[windows:dns]&lt;BR /&gt;SHOULD_LINEMERGE = True&lt;BR /&gt;BREAK_ONLY_BEFORE_DATE = True&lt;BR /&gt;EXTRACT-Domain = (?i) .*? \.(?P&amp;lt;Domain&amp;gt;[-a-zA-Z0-9@:%_\+.~#?;//=]{2,256}\.[a-z]{2,6})&lt;BR /&gt;EXTRACT-src=(?i) [Rcv|Snd] (?P&amp;lt;source_address&amp;gt;\d+\.\d+\.\d+\.\d+)&lt;BR /&gt;EXTRACT-Threat_ID,Context,Int_packet_ID,proto,mode,Xid,type,Opcode,Flags_Hex,char_code,ResponseCode,question_type = .+?[AM|PM]\s+(?&amp;lt;Threat_ID&amp;gt;\w+)\s+(?&amp;lt;Context&amp;gt;\w+)\s+(?&amp;lt;Int_packet_ID&amp;gt;\w+)\s+(?&amp;lt;proto&amp;gt;\w+)\s+(?&amp;lt;mode&amp;gt;\w+)\s+\d+\.\d+\.\d+\.\d+\s+(?&amp;lt;Xid&amp;gt;\w+)\s(?&amp;lt;type&amp;gt;(?:R)?)\s+(?&amp;lt;Opcode&amp;gt;\w+)\s+\[(?&amp;lt;Flags_Hex&amp;gt;\w+)\s(?&amp;lt;char_codes&amp;gt;.+?)(?&amp;lt;ResponseCode&amp;gt;[A-Z]+)\]\s+(?&amp;lt;question_type&amp;gt;\w+)\s&lt;BR /&gt;EXTRACT-Authoritative_Answer,TrunCation,Recursion_Desired,Recursion_Available = (?m) .+?Message:\W.+\W.+\W.+\W.+\W.+AA\s+(?&amp;lt;Authoritative_Answer&amp;gt;\d)\W.+TC\s+(?&amp;lt;TrunCation&amp;gt;\d)\W.+RD\s+(?&amp;lt;Recursion_Desired&amp;gt;\d)\W.+RA\s+(?&amp;lt;Recursion_Available&amp;gt;\d)&lt;BR /&gt;SEDCMD-win_dns = s/\(\d+\)/./g&lt;/P&gt;
&lt;P&gt;======HF inputs.conf======&lt;/P&gt;
&lt;P&gt;[splunktcp://:5143]&lt;BR /&gt;connection_host = x.x.x.x (masking IP)&lt;BR /&gt;index = dns&lt;BR /&gt;disabled = 0&lt;/P&gt;
&lt;P&gt;======HF props.conf======&lt;/P&gt;
&lt;P&gt;[windows:dns]&lt;BR /&gt;EXTRACT-Domain = (?i) .*? \.(?&amp;lt;Domain&amp;gt;[-a-zA-Z0-9@:%_\+.~#?;//=]{2,256}\.[a-z]{2,6})&lt;BR /&gt;EXTRACT-windows_dns_000001 = (?&amp;lt;thread_id&amp;gt;[0-9A-Fa-f]{4}) (?&amp;lt;Context&amp;gt;[^\s]+)\s+(?&amp;lt;internal_packet_id&amp;gt;[0-9A-Fa-f]+) (?&amp;lt;protocol&amp;gt;UDP|TCP) (?&amp;lt;direction_flag&amp;gt;Snd|Rcv) (?&amp;lt;client_ip&amp;gt;[0-9\.]+)\s+(?&amp;lt;xid&amp;gt;[0-9A-Fa-f]+) (?&amp;lt;type&amp;gt;[R\s]{1}) (?&amp;lt;opcode&amp;gt;[A-Z\?]{1}) \[(?&amp;lt;flags&amp;gt;[0-9A-Fa-f]+) (?&amp;lt;flagAuthoritativeAnswer&amp;gt;[A\s]{1})(?&amp;lt;flagTrucatedResponse&amp;gt;[T\s]{1})(?&amp;lt;flagRecursionDesire&amp;gt;[D\s]{1})(?&amp;lt;flagRecursionAvailable&amp;gt;[R\s]{1})\s+(?&amp;lt;response_code&amp;gt;[^\]]+)\]\s+(?&amp;lt;query_type&amp;gt;[^\s]+)\s+(?&amp;lt;query_name&amp;gt;[^/]+)&lt;BR /&gt;EXTRACT-windows_dns_000010 = ([a-zA-Z0-9\-\_]+)\([0-9]+\)(?&amp;lt;tld&amp;gt;[a-zA-Z0-9\-\_]+)\(0\)$&lt;BR /&gt;EXTRACT-windows_dns_000020 = \([0-9]+\)(?&amp;lt;domain&amp;gt;[a-zA-Z0-9\-\_]+\([0-9]+\)[a-zA-Z0-9\-\_]+)\(0\)$&lt;BR /&gt;EXTRACT-windows_dns_000030 = \s\([0-9]+\)(?&amp;lt;hostname&amp;gt;[a-zA-Z0-9\-\_]+)\(0\)$&lt;BR /&gt;EVAL-domain = replace(domain, "([\(0-9\)]+)", ".")&lt;BR /&gt;EVAL-query_domain = ltrim(replace(query_name, "(\([\d]+\))", "."),".")&lt;BR /&gt;EVAL-type_msg = case(type="R", "Response", isnull(type), "Query")&lt;BR /&gt;EVAL-opcode_msg = case(opcode="Q", "Standard Query", opcode="N", "Notify", opcode="U", "Update", opcode="?", "Unknown")&lt;BR /&gt;EVAL-direction = case(direction_flag="Snd", "Send", direction_flag="Rcv", "Received")&lt;BR /&gt;EVAL-decID = tonumber(xid, 16)&lt;BR /&gt;REPORT-win_dns = dns_string_lengths, dns_strings&lt;BR /&gt;REPORT-extractdoms = extractdoms&lt;BR /&gt;REPORT-extractips = extractips&lt;/P&gt;
&lt;P&gt;======HF transforms.conf======&lt;/P&gt;
&lt;P&gt;[dns_string_lengths]&lt;BR /&gt;REGEX = \((\d+)\)&lt;BR /&gt;FORMAT = strings_len::$1&lt;BR /&gt;MV_ADD = true&lt;BR /&gt;REPEAT_MATCH = true&lt;/P&gt;
&lt;P&gt;[dns_strings]&lt;BR /&gt;REGEX = \([0-9]+\)([a-zA-Z0-9\-\_]+)\([0-9]+\)&lt;BR /&gt;FORMAT = strings::$1&lt;BR /&gt;MV_ADD = true&lt;BR /&gt;REPEAT_MATCH = true&lt;/P&gt;
&lt;P&gt;[extractdoms]&lt;BR /&gt;SOURCE_KEY = query_domain&lt;BR /&gt;REGEX = Name\s+\"(?&amp;lt;NewDomain&amp;gt;[a-zA-Z0-9\[\]\(\)\-\.\_]+\"\n)&lt;BR /&gt;FORMAT = strings::$1&lt;BR /&gt;MV_ADD = true&lt;BR /&gt;REPEAT_MATCH = true&lt;/P&gt;
&lt;P&gt;[extractips]&lt;BR /&gt;REGEX = DATA\s+(?&amp;lt;Answers&amp;gt;[0-9\.]+\n)&lt;BR /&gt;FORMAT = strings::$1&lt;BR /&gt;MV_ADD = true&lt;BR /&gt;REPEAT_MATCH = true&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2022 04:48:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562795#M100288</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2022-03-18T04:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562817#M100290</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/235933"&gt;@qcjacobo2577&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you have a copy of your&amp;nbsp;&lt;SPAN&gt;UF props.conf deployed to HF and restart and see how it goes. UF can not do parsing when you have HF in line then props having parsing line_breaker, timestamp extractions shall be deployed to HF. I haven't verified your UF props conf, however the following shall work with Parsing deployin into HF, you might need to set TZ (timezone) as well.&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;## props conf shall be deployed to HF
[windows:dns]
SHOULD_LINEMERGE=false
LINE_BREAKER=([\r\n]+)\d+\/\d+\/\d+\s+\d+:\d+:\d+
NO_BINARY_CHECK=true
TIME_PREFIX=^
TIME_FORMAT=%m/%d/%Y %H:%M:%S %p&lt;/LI-CODE&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;An upvote would be appreciated And Accept solution if this reply helps!&lt;/P&gt;</description>
      <pubDate>Tue, 10 Aug 2021 22:10:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562817#M100290</guid>
      <dc:creator>venkatasri</dc:creator>
      <dc:date>2021-08-10T22:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562819#M100292</link>
      <description>&lt;P&gt;Just so I am clear, you are saying;&lt;/P&gt;&lt;P&gt;1. Take &lt;U&gt;&lt;STRONG&gt;all&lt;/STRONG&gt; &lt;/U&gt;of the content currently contained&amp;nbsp; within my UF props.conf and move it to my HF props.conf (which means I will not longer have a props.conf file on my UF), correct?&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. If the answer to #1 is "Yes", do I &lt;STRONG&gt;&lt;U&gt;merge&lt;/U&gt;&lt;/STRONG&gt; the UF props.conf content with my existing HF props.conf content or replace it?&lt;/P&gt;&lt;P&gt;3. You are also referencing a new HF props.conf file as well.&amp;nbsp; What am I doing with that content?&amp;nbsp; Adding it to the above?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Aug 2021 22:38:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562819#M100292</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2021-08-10T22:38:47Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562826#M100293</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/235933"&gt;@qcjacobo2577&lt;/a&gt;&amp;nbsp; Technically the UF props conf having nothing specific to parsing which works on UF. It's all mixed up EXTRACT-* are search-time settings shall go to SH, SEDCMD is index time should goto HF/indexers and should_line_merge and break_only** are parsings related should go to HF I highly doubt it works for your parsing requirement.&lt;/P&gt;&lt;P&gt;I would say try the props conf that i have provided on HF, yes you can merge with existing HF props you have.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Aug 2021 23:14:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562826#M100293</guid>
      <dc:creator>venkatasri</dc:creator>
      <dc:date>2021-08-10T23:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562827#M100294</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/235933"&gt;@qcjacobo2577&lt;/a&gt;&amp;nbsp; just seen your HF props and transforms conf they are not related to parsing do not work on HF. Setting EXTRACT-*, REPORT-* are search-time should get deployed to search head.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Aug 2021 23:16:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562827#M100294</guid>
      <dc:creator>venkatasri</dc:creator>
      <dc:date>2021-08-10T23:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562950#M100301</link>
      <description>&lt;P&gt;I have completely removed the props.conf from UF.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I have the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;An inputs.conf file on the UF as shown below:&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[monitor://c:\windows\system32\dns\dns.log]
disabled = 0
index = dns
sourcetype = windows:dns&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;An outputs.conf file on the UF (not shown as it is not relevant to this discussion).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;A modified the props.conf on the HF to reflect the following (as you recommended):&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[windows:dns]
SHOULD_LINEMERGE=false
LINE_BREAKER=([\r\n]+)\d+\/\d+\/\d+\s+\d+:\d+:\d+
NO_BINARY_CHECK=true
TIME_PREFIX=^
TIME_FORMAT=%m/%d/%Y %H:%M:%S %p&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Within Splunk Cloud&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I have the following configuration for "calculated fields".&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15499i052D7CEFF7BF0C67/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The following for "field extractions".&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15500i4B24F737FA0E8105/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The following for field transformations:&lt;/LI&gt;&lt;/UL&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15501i2416A49207E1B6D1/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15502i3868C602B2100D74/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15504iF4D8866F464D4C8C/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15506iC0B5CCBA2AE25146/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15507i03064AC9E5476823/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The following reports:&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15509i5621938CB5F02690/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This results in the following fields being parsed:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 160px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15531iC8703E4358DFFD5F/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;AND&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 153px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15532iDB6D15D2C777D7F0/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I am however, not able to parse the following:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 417px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15533i0C64BC79E8317881/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 14:57:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/562950#M100301</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2021-08-11T14:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563002#M100312</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/235933"&gt;@qcjacobo2577&lt;/a&gt;&amp;nbsp; If your original parsing issue at HF level has been resolved I would advise to close this thread/Accept solution if working fine&amp;nbsp; and re-open new one for Extraction issues.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Aug 2021 00:15:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563002#M100312</guid>
      <dc:creator>venkatasri</dc:creator>
      <dc:date>2021-08-12T00:15:08Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563533#M100389</link>
      <description>&lt;P&gt;Why can't you install the UF on the servers and use the Splunk_TA_windows to send the data straight to the Splunk Cloud indexers?&lt;/P&gt;&lt;P&gt;Example inputs.conf configuration:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;[WinEventLog://DNS Server]&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;disabled = false&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;You'll need the TA on the indexer cluster and search head/search head cluster too of course.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 20:56:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563533#M100389</guid>
      <dc:creator>m_pham</dc:creator>
      <dc:date>2021-08-16T20:56:20Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563535#M100390</link>
      <description>&lt;P&gt;First of all, thank you.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Couple of things:&lt;/P&gt;&lt;P&gt;1. I am trying to limit the number of internet-facing firewall rules I need to create to send external (in part this is why we chose to use the HF --- and why I am forwarding logs from the UF ---&amp;gt; HF ----&amp;gt; Splunk Cloud).&lt;/P&gt;&lt;P&gt;2. We have an inputs.conf already on the UF which is pointing to the DNS logs on the local DNS server --- as well as an outputs.conf pointing to the on-premise HF (which has no indexing enabled but is a Splunk enterprise install).&lt;/P&gt;&lt;P&gt;3. I have the Windows TA installed in Splunk Cloud already, so I believe we are in alignment there already.&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Question&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;If I understand you correctly, you are saying that I should;&lt;/P&gt;&lt;P&gt;1. Install the Splunk Windows TA onto the same server where my existing UF resides, correct?&lt;/P&gt;&lt;P&gt;2. Place my existing inputs.conf (one monitoring my local DNS logs) into the Splunk TA application directory, correct?&lt;/P&gt;&lt;P&gt;3. Given what I initially mentioned as to my reason for an HF, how might I still accomplish this with an HF in play?&amp;nbsp; Can I still install the Splunk Windows TA on the UF and get the same result?&amp;nbsp; Do I need to install the TA onto both the UF and HF?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 21:13:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563535#M100390</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2021-08-16T21:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563537#M100391</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/235933"&gt;@qcjacobo2577&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Question&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;If I understand you correctly, you are saying that I should;&lt;/P&gt;&lt;P&gt;1. Install the Splunk Windows TA onto the same server where my existing UF resides, correct?&lt;/P&gt;&lt;P&gt;2. Place my existing inputs.conf (one monitoring my local DNS logs) into the Splunk TA application directory, correct?&lt;/P&gt;&lt;P&gt;3. Given what I initially mentioned as to my reason for an HF, how might I still accomplish this with an HF in play?&amp;nbsp; Can I still install the Splunk Windows TA on the UF and get the same result?&amp;nbsp; Do I need to install the TA onto both the UF and HF?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;For &lt;STRONG&gt;#1&lt;/STRONG&gt;: Yes, you'd need to install the &lt;A href="https://splunkbase.splunk.com/app/742/" target="_self"&gt;Splunk_TA_windows&lt;/A&gt; on all of the DNS servers' UFs that you want to collect the DNS logs for and send to the HF that you have that forwards to Splunk Cloud.&amp;nbsp; Since this will be considerend a non-default Windows event logs, you'd need to import the DNS logs to the Windows Event Viewer - see documentation &lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/8.2.2106/Data/MonitorWindowseventlogdata#Monitor_non-default_Windows_event_logs" target="_self"&gt;here&lt;/A&gt;. Technically you don't even need a HF for this anymore if you don't plan on having any parsing configs - look at this for that:&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.2.1/Forwarding/Configureanintermediateforwarder" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/Splunk/8.2.1/Forwarding/Configureanintermediateforwarder&lt;/A&gt;&lt;/P&gt;&lt;P&gt;For&amp;nbsp;&lt;STRONG&gt;#2:&amp;nbsp;&lt;/STRONG&gt;You can send your local DNS logs by importing them to the Windows Event Viewer and have the Splunk_TA_windows inputs.conf ingest that - again, documentation &lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/8.2.2106/Data/MonitorWindowseventlogdata#Monitor_non-default_Windows_event_logs" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;For &lt;STRONG&gt;#3&lt;/STRONG&gt;: Like I said, you don't need the HF to parse the logs if you are using the Splunk_TA_windows - you just need an intermediate forwarder to send it to Splunk Cloud. Splunk Cloud indexers would need the Splunk_TA_windows to parse the data. Your search head(s) would need the TA too for field extractions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my opinion, it's much simpler to use the Splunk Base TA for this as you don't need to create custom field extractions like you did.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 21:40:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563537#M100391</guid>
      <dc:creator>m_pham</dc:creator>
      <dc:date>2021-08-16T21:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563538#M100392</link>
      <description>&lt;P&gt;Totally understand where you are going with this...however...&lt;/P&gt;&lt;P&gt;When you say " &lt;EM&gt;Since this will be considered a non-default Windows event logs, &lt;/EM&gt;&lt;STRONG&gt;&lt;U&gt;&lt;EM&gt;you'd need to import the DNS logs to the Windows Event Viewer&lt;/EM&gt;"&lt;/U&gt;&lt;/STRONG&gt;,&amp;nbsp; in my case&amp;nbsp;we are talking about DNS debug logging (&lt;A href="https://nxlog.co/documentation/nxlog-user-guide/windows-dns-server.html#dns_windows_filebased_logging" target="_blank"&gt;https://nxlog.co/documentation/nxlog-user-guide/windows-dns-server.html#dns_windows_filebased_logging&lt;/A&gt;)&amp;nbsp; and not DNS logs exposed in the Windows Event logs.&amp;nbsp; DNS debug logs are a flat file stored in the location you specify during the initial configuration (there is no corresponding .evtx file to extract from or import into.&amp;nbsp; DNS auditing (what I believe you are referring to) only captures audit events ---&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn800669(v%3Dws.11)#audit-events)" target="_self"&gt;https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn800669(v%3Dws.11)#audit-events).&amp;nbsp;&lt;/A&gt;While these are useful, they do not provide the DNS query/response data I am seeking in this case.&amp;nbsp; We also looked at DNS Analytical logs --- also stored in the Windows Event Viewer --- but these are really purpose built for debugging specific scenarios --- not meant to be always on --- and do not actually present messages in the event log until debugging is disabled).&lt;/P&gt;&lt;P&gt;So, unless you are aware of something I am not, we are still talking about a flat file.&amp;nbsp; Can the Windows TA parse this?&amp;nbsp; I know there used to be a Windows DNS specific TA but that was deprecated for Splunk Cloud.&lt;/P&gt;&lt;P&gt;I am thinking of using Splunk Stream but am not sure as to the performance impact on my DCs.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 21:55:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563538#M100392</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2021-08-16T21:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563541#M100393</link>
      <description>&lt;P&gt;Gotcha, in that case ignore my initial suggestion. I would suggest trying to take a sample data to a standalone instance and configuring the field extraction in the GUI to see what it comes up with in the back end - you have quite a few to being with and mix of props and transforms.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Otherwise - I would have to let another person with more knowledge of field extraction to try and help you on this one.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 22:19:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563541#M100393</guid>
      <dc:creator>m_pham</dc:creator>
      <dc:date>2021-08-16T22:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563551#M100395</link>
      <description>&lt;P&gt;I was able to get most of the fields parsed properly without issue.&amp;nbsp; As someone stated previously, most of these had to be performed at search time --- which is not a problem per se.&amp;nbsp; The only 2 issues I seem to be having are:&lt;/P&gt;&lt;P&gt;1. The size of the data itself is quite large.&amp;nbsp; If I am only able to perform field extraction at search time --- and we are talking about Splunk Cloud --- is there a way I can reduce my log ingestion --- as to lessen the impact on my ingest licensing?&amp;nbsp; &amp;nbsp;Can I perform some line suppression within my UF or HF?&lt;/P&gt;&lt;P&gt;2. I am trying to extract the DATA field in the DNS response without much luck.&amp;nbsp; Doing that through the UI only presents an issue (will show you what I mean below in the embedded images:&lt;/P&gt;&lt;P&gt;===&lt;/P&gt;&lt;P&gt;Here is my search:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 429px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15590i1A6714259487889E/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Here is the result I am targeting for parsing (honing in on the "DATA field boxed in red):&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15591i7B299C981E2FE512/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I am not seeing that field when I select "Extract Fields".&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 344px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15592i080EC5F64FE5728E/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15595iC2028709DC400BE2/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;How do I expose the data field in the UI such that I can even attempt to extract for parsing?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 22:44:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563551#M100395</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2021-08-16T22:44:57Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563559#M100397</link>
      <description>&lt;P&gt;If it's not working in the GUI - try modifying the configurations in the back end (props.conf/transforms.conf). Since you are using Splunk Cloud, I assume you are uploading the app via self service app install - this may trigger a search head restart.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.2.1/Knowledge/Exampleconfigurationsusingfieldtransforms" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.2.1/Knowledge/Exampleconfigurationsusingfieldtransforms&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Admin/propsconf" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Admin/propsconf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Admin/transformsconf" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Admin/transformsconf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 23:49:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563559#M100397</guid>
      <dc:creator>m_pham</dc:creator>
      <dc:date>2021-08-16T23:49:00Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563560#M100398</link>
      <description>&lt;P&gt;I don't have CLI access to Splunk Cloud to make any changes to the "back-end".&amp;nbsp; My understanding via support is that setup is pretty standard.&amp;nbsp; How do I go about getting the access you suggested.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other option I took was to try and create the props.conf and transforms.conf from the article mentioned here:&amp;nbsp;&lt;A href="https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-parse-the-full-Windows-DNS-Trace-logs/m-p/345347" target="_blank"&gt;https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-parse-the-full-Windows-DNS-Trace-logs/m-p/345347.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The difference being in that I took all of the props.conf and transforms.conf entries and placed them in the "Fields" configuration within Splunk Cloud.&amp;nbsp; I could not figure out where to put SECMD (not obvious in the UI).&amp;nbsp; You can see all of this visually in one of my posts in this case.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just need to be able to&lt;/P&gt;&lt;P&gt;1. Parse the IP address field mentioned previously from the raw log.&amp;nbsp; Do you know how to do that?&amp;nbsp; &amp;nbsp;Everything else is parsing.&lt;/P&gt;&lt;P&gt;2. Reduce the log volume before it is indexed.&amp;nbsp; There are a large number of fields I simply do not need as they do not add any value from a security perspective.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 00:04:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/563560#M100398</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2021-08-17T00:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/589558#M103378</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;qcjacobo2577 - First awesome work on this. Info on how to onboard and parse Windows DNS logs seems to be sparse. We just started ingesting MS DNS logs and they are a mess. Did you ever get to a point where you could parse out the "Answer" section?&lt;/DIV&gt;</description>
      <pubDate>Thu, 17 Mar 2022 17:49:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/589558#M103378</guid>
      <dc:creator>jvsplunker</dc:creator>
      <dc:date>2022-03-17T17:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/589559#M103379</link>
      <description>&lt;P&gt;No, we ended up going with Splunk Stream.&amp;nbsp; I cannot advocate for that approach enough as parsing the native logs is a mess.&amp;nbsp; Even if I could make it work, it is all happening at search time and does not account for the fact that the log formatting could change over time.&amp;nbsp; Happy to share what we did if you are interested.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 17:55:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/589559#M103379</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2022-03-17T17:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/604551#M105133</link>
      <description>&lt;P&gt;Hi, I would be very interested to see how you ended up onboarding and your sourcetype for these logs. Have you mapped to the Network_Resolution datamodel?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are also looking at onboarding windows DNS logs but the information out there is lacking.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2022 08:30:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/604551#M105133</guid>
      <dc:creator>konstr</dc:creator>
      <dc:date>2022-07-06T08:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Parsing Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/604628#M105145</link>
      <description>&lt;P&gt;The short of it is that we gave up on the parsing and decided to leverage "Splunk Stream" for DNS.&amp;nbsp; We have had zero issues with the approach to date and have gotten the data we are looking for in terms of the query itself as well as the resulting response.&amp;nbsp; The fields you want to collect are configurable which means less data to ingest into Splunk (vs the parsing/filtering that had to be done at search time).&lt;/P&gt;&lt;P&gt;Happy to discuss further, so let me know.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2022 17:00:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Issue-Parsing-Windows-DNS-Logs/m-p/604628#M105145</guid>
      <dc:creator>qcjacobo2577</dc:creator>
      <dc:date>2022-07-06T17:00:29Z</dc:date>
    </item>
  </channel>
</rss>

