- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Monitor Windows trace files
I have a bunch of ETL files received from a customer I wish to analyze with splunk. I have added the folder containing all the files to splunk, but can't see any result when searching.
1. Does splunk support ETL format (binary) ?
2. Is there a way to track down files which are being indexed ?
regards,
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Something is going to have to decode it before it comes into splunk. Splunk has a way to facilitate this decoding automatically as part of the forwarding process but you must have access to the decoder tool as a command-line executable, for example:
https://msdn.microsoft.com/en-us/library/windows/hardware/ff543596(v=vs.85).aspx
The process for this is well documented here:
http://blogs.splunk.com/2011/07/19/the-naughty-bits-how-to-splunk-binary-logfiles/
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

I'll answer the second question first, because it's easier. First you can always check the source field when searching against the target index. For file and directory monitors it will tell you which files provided the event.
As to the second, Splunk does not understand binary data. If you have a process that can translate the binary to something human readable, you can use that as a scripted input into splunk however.
