<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Windows DNS Logs in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190876#M98548</link>
    <description>&lt;P&gt;Using splunk 6.0.1 - trying to do some testing with Windows DNS logs to see if can get the data formatted and dropping events we dont want to keep.  I found some answers on the splunk site, but either I have something misconfigured, I am missing something or some other issue is cropping up, I an unable to get the SDECMD and the TRANSFORM to both work.  We have a TRANSFORM that will drop certain events - this is working.  We also want to add in the SEDCMD which will change the output from (3)www(3)ibm(3)com type output to be .&lt;A href="http://www.ibm.com"&gt;www.ibm.com&lt;/A&gt; output.  The SEDCMD part is not working.  Is this because of a misconfiguration on my part, is it due to already having data that is indexed or something else?   This is my first foray into using splunk.  Was able to set up Windows DHCP logs pretty quickly.  I created a basic app for the windows dns logs to do some testing.  I have tried different options with getting the SEDCMD working.  Can anyone help? &lt;/P&gt;</description>
    <pubDate>Mon, 17 Mar 2014 13:52:54 GMT</pubDate>
    <dc:creator>caspertz</dc:creator>
    <dc:date>2014-03-17T13:52:54Z</dc:date>
    <item>
      <title>Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190876#M98548</link>
      <description>&lt;P&gt;Using splunk 6.0.1 - trying to do some testing with Windows DNS logs to see if can get the data formatted and dropping events we dont want to keep.  I found some answers on the splunk site, but either I have something misconfigured, I am missing something or some other issue is cropping up, I an unable to get the SDECMD and the TRANSFORM to both work.  We have a TRANSFORM that will drop certain events - this is working.  We also want to add in the SEDCMD which will change the output from (3)www(3)ibm(3)com type output to be .&lt;A href="http://www.ibm.com"&gt;www.ibm.com&lt;/A&gt; output.  The SEDCMD part is not working.  Is this because of a misconfiguration on my part, is it due to already having data that is indexed or something else?   This is my first foray into using splunk.  Was able to set up Windows DHCP logs pretty quickly.  I created a basic app for the windows dns logs to do some testing.  I have tried different options with getting the SEDCMD working.  Can anyone help? &lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2014 13:52:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190876#M98548</guid>
      <dc:creator>caspertz</dc:creator>
      <dc:date>2014-03-17T13:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190877#M98549</link>
      <description>&lt;P&gt;Here's what I've got in mine and it's working:&lt;/P&gt;

&lt;P&gt;These files are to be installed on the indexers...&lt;/P&gt;

&lt;P&gt;props.conf&lt;BR /&gt;
&lt;PRE&gt;&lt;BR /&gt;
[windns_query]&lt;BR /&gt;
SEDCMD-win_dns = s/\(\d+\)/./g&lt;BR /&gt;
EXTRACT-src_ip-fqdn = Rcv\s(?P[^\s]+)\s+.+]\s(?P[^\s]+)\s+\.(?P[^\s]+)\.$&lt;BR /&gt;
TRANSFORMS-windns = windnsnull&lt;BR /&gt;
&lt;/PRE&gt;&lt;BR /&gt;
transforms.conf&lt;BR /&gt;
&lt;PRE&gt;&lt;BR /&gt;
[windnsnull]&lt;BR /&gt;
REGEX = (^[^\d]|IN-ADDR|in-addr|\sSnd\s|\sR\sQ\s|\.ip6\.arpa|NXDOMAIN|windowsupdate\.com)&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;BR /&gt;
&lt;/PRE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:11:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190877#M98549</guid>
      <dc:creator>wbfoxii</dc:creator>
      <dc:date>2020-09-28T16:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190878#M98550</link>
      <description>&lt;P&gt;Thanks for the responses.&lt;/P&gt;

&lt;P&gt;I finally got mine to work.  I had to modify my transforms to use the modified output after my SEDCMD. &lt;/P&gt;

&lt;P&gt;Now I have the other issue with the dns logs not being recreated.   Do you have that same issue?  Are you using the Windows app for your logs?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2014 12:52:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190878#M98550</guid>
      <dc:creator>caspertz</dc:creator>
      <dc:date>2014-03-20T12:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190879#M98551</link>
      <description>&lt;P&gt;This should probably be titled "DNS transformations and filtering".  "Windows DNS Logs" gives the implication that there will be discussion of the meanings and interpretations of the logs themselves.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2014 13:09:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190879#M98551</guid>
      <dc:creator>landen99</dc:creator>
      <dc:date>2014-04-29T13:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190880#M98552</link>
      <description>&lt;P&gt;I followed and copied exactly the props.conf and transforms.conf&lt;/P&gt;

&lt;P&gt;but I am still not able to extract and remove the (&lt;STRONG&gt;3)www(3)ibm(3)com&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Not sure what I am missing; I am on a clustered index.&lt;/P&gt;

&lt;P&gt;My index are &lt;STRONG&gt;dns&lt;/STRONG&gt; and also created &lt;STRONG&gt;win_dns&lt;/STRONG&gt; just to follow the examples.&lt;/P&gt;

&lt;P&gt;Am I doing something wrong?&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2016 20:43:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190880#M98552</guid>
      <dc:creator>kormot</dc:creator>
      <dc:date>2016-03-04T20:43:09Z</dc:date>
    </item>
    <item>
      <title>Re: Windows DNS Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190881#M98553</link>
      <description>&lt;P&gt;Kormot, try this for the SEDCMD in your props:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;SEDCMD-win_dns = s/\(\d+\)/./g
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Note the escaped parenthesis and the \ before the d as well.  These look to be missing from wbfoxii's props.conf due to formatting.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2016 20:58:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-DNS-Logs/m-p/190881#M98553</guid>
      <dc:creator>vasildavid</dc:creator>
      <dc:date>2016-03-04T20:58:43Z</dc:date>
    </item>
  </channel>
</rss>

