<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unable to parse dns windows logs in splunk in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216405#M42589</link>
    <description>&lt;P&gt;I am unable to parse windows logs in splunk. My raw event contains &lt;CODE&gt;2)35(2)48(3)199(3)157(7)in-addr(4)arpa(0)&lt;/CODE&gt;. I want to remove the &lt;CODE&gt;()&lt;/CODE&gt; for the domain name.&lt;/P&gt;

&lt;P&gt;I tried to configure the following in props.conf on the indexers and restarted them but no luck:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[DNS]
MAX_TIMESTAMP_LOOKAHEAD=128
TRUNCATE=20000
DATETIME_CONFIG=CURRENT
NO_BINARY_CHECK=true
SHOULD_LINEMERGE=false
disabled=false
SEDCMD-win_dns = s/\(\d+\)/./g
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Any assistance in troubleshooting this issue is greatly appreciated.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Mohammed Mohiuddin&lt;/P&gt;</description>
    <pubDate>Sat, 31 Oct 2015 17:19:38 GMT</pubDate>
    <dc:creator>OMohi</dc:creator>
    <dc:date>2015-10-31T17:19:38Z</dc:date>
    <item>
      <title>Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216405#M42589</link>
      <description>&lt;P&gt;I am unable to parse windows logs in splunk. My raw event contains &lt;CODE&gt;2)35(2)48(3)199(3)157(7)in-addr(4)arpa(0)&lt;/CODE&gt;. I want to remove the &lt;CODE&gt;()&lt;/CODE&gt; for the domain name.&lt;/P&gt;

&lt;P&gt;I tried to configure the following in props.conf on the indexers and restarted them but no luck:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[DNS]
MAX_TIMESTAMP_LOOKAHEAD=128
TRUNCATE=20000
DATETIME_CONFIG=CURRENT
NO_BINARY_CHECK=true
SHOULD_LINEMERGE=false
disabled=false
SEDCMD-win_dns = s/\(\d+\)/./g
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Any assistance in troubleshooting this issue is greatly appreciated.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Mohammed Mohiuddin&lt;/P&gt;</description>
      <pubDate>Sat, 31 Oct 2015 17:19:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216405#M42589</guid>
      <dc:creator>OMohi</dc:creator>
      <dc:date>2015-10-31T17:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216406#M42590</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Try using&lt;/STRONG&gt; &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;\d
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;instead of d, also escape the ( &amp;amp; ) else you're forming a capture group&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;SEDCMD-win_dns = s/\(\d+\)/./g
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 31 Oct 2015 19:36:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216406#M42590</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2015-10-31T19:36:14Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216407#M42591</link>
      <description>&lt;P&gt;The backslashes in the question were lost in formatting, I've fixed them.&lt;/P&gt;</description>
      <pubDate>Sat, 31 Oct 2015 22:23:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216407#M42591</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2015-10-31T22:23:22Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216408#M42592</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;sedcmd only happens at index time.  Can you confirm you're not using a heavy forwarder to send the data in?

Also, you may want to try using rex to get the regular expression right first, and then move it to a sedcmd

search .... | rex field=fieldname mode=sec "s/\(\d+\)/./g" | table fieldname

I'm thinking you may need a \ in front of the . as well  Especially in windows as the windows regex is funny at times. 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 01 Nov 2015 02:31:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216408#M42592</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2015-11-01T02:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216409#M42593</link>
      <description>&lt;P&gt;Yes I am not using heavy forwarder. The logs are collected on universal forwarder and send to the indexer for parsing.&lt;/P&gt;

&lt;P&gt;I am able to use the following query  in search time, and hence tried to make this permanent by copying it in props.conf &lt;/P&gt;

&lt;P&gt;THe following is the query I am trying to execute:&lt;/P&gt;

&lt;P&gt;index=dns | rex mode=sed "s/(\d+)/./g"&lt;/P&gt;

&lt;P&gt;and I am getting the domain name without the () brackets.&lt;/P&gt;

&lt;P&gt;But unable to copy the same in props.conf and get similar results:&lt;BR /&gt;
[DNS]&lt;BR /&gt;
 MAX_TIMESTAMP_LOOKAHEAD=128&lt;BR /&gt;
 TRUNCATE=20000&lt;BR /&gt;
 DATETIME_CONFIG=CURRENT&lt;BR /&gt;
 NO_BINARY_CHECK=true&lt;BR /&gt;
 SHOULD_LINEMERGE=false&lt;BR /&gt;
 disabled=false&lt;BR /&gt;
 SEDCMD-win_dns = s/(\d+)/./g&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:44:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216409#M42593</guid>
      <dc:creator>OMohi</dc:creator>
      <dc:date>2020-09-29T07:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216410#M42594</link>
      <description>&lt;P&gt;In current versions of Splunk, a lot of the Windows event log parsing happens on Universal Forwarders as well - do deploy that props.conf to your forwarder and see if it correctly changes newly indexed events from then on.&lt;/P&gt;</description>
      <pubDate>Sun, 01 Nov 2015 17:15:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216410#M42594</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2015-11-01T17:15:59Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216411#M42595</link>
      <description>&lt;P&gt;Interesting... good to know too!&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2015 21:58:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216411#M42595</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2015-11-02T21:58:34Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216412#M42596</link>
      <description>&lt;P&gt;Yes I have made the props entry on the UF's as well and restarted, but still no luck.&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 19:24:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216412#M42596</guid>
      <dc:creator>OMohi</dc:creator>
      <dc:date>2015-11-03T19:24:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216413#M42597</link>
      <description>&lt;P&gt;Try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;s/((\d+))/./g

and this

s/\((\d+)\)/./g
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;We should check the docs to see what regex style windows uses, escape characters etc...&lt;/P&gt;

&lt;P&gt;I like to change config and restart many times...&lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2015 15:40:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216413#M42597</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2015-11-04T15:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216414#M42598</link>
      <description>&lt;P&gt;maybe this too:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;s/\(\(\d+\)\)/./g

go crazy... you'll find it and post it back as the answer please ;-)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 04 Nov 2015 15:43:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216414#M42598</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2015-11-04T15:43:15Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216415#M42599</link>
      <description>&lt;P&gt;This is what I use:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[MSAD:NT6:DNS]
SEDCMD-win_dns-first = s/\(\d+\)/./g
SEDCMD-win_dns-second = s/\s\.(.*)\.$/ \1/g
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 07 Nov 2015 06:28:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216415#M42599</guid>
      <dc:creator>spayneort</dc:creator>
      <dc:date>2015-11-07T06:28:09Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216416#M42600</link>
      <description>&lt;P&gt;You should be able to chain those together like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[MSAD:NT6:DNS]
SEDCMD-win_dns = s/\(\d+\)/./g s/\s\.(.*)\.$/ \1/g
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 07 Nov 2015 14:28:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/216416#M42600</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-11-07T14:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to parse dns windows logs in splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/530229#M89271</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;In addition to the query like this (&lt;SPAN&gt;2)35(2)48(3)199(3)157(7)in-addr(4)arpa(0), the logs are followed by UDP Response and many lines..&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ex.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;] A (&lt;SPAN&gt;2)35(2)48(3)199(3)157(7)in-addr(4)arpa(0)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;UDP Response......&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When I used -&amp;nbsp;SEDCMD-win_dns = s/\(\d+\)/./g s/\s\.(.*)\.$/ \1/g&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;the log is formatted as&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt;] A .35.48.199.157.in-addr.arpa.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;There is a 'dot' at the end. Can you please advise on how to remove the trailing dot alone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Nov 2020 15:34:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Unable-to-parse-dns-windows-logs-in-splunk/m-p/530229#M89271</guid>
      <dc:creator>aswin_asok</dc:creator>
      <dc:date>2020-11-20T15:34:43Z</dc:date>
    </item>
  </channel>
</rss>

