Getting Data In

Monitor Windows trace files

zivraf
Engager

I have a bunch of ETL files received from a customer I wish to analyze with splunk. I have added the folder containing all the files to splunk, but can't see any result when searching.
1. Does splunk support ETL format (binary) ?
2. Is there a way to track down files which are being indexed ?

regards,

Tags (1)

woodcock
Esteemed Legend

Something is going to have to decode it before it comes into splunk. Splunk has a way to facilitate this decoding automatically as part of the forwarding process but you must have access to the decoder tool as a command-line executable, for example:
https://msdn.microsoft.com/en-us/library/windows/hardware/ff543596(v=vs.85).aspx

The process for this is well documented here:
http://blogs.splunk.com/2011/07/19/the-naughty-bits-how-to-splunk-binary-logfiles/

pwattssplunk
Splunk Employee
Splunk Employee

I'll answer the second question first, because it's easier. First you can always check the source field when searching against the target index. For file and directory monitors it will tell you which files provided the event.

As to the second, Splunk does not understand binary data. If you have a process that can translate the binary to something human readable, you can use that as a scripted input into splunk however.

Get Updates on the Splunk Community!

Splunk Answers Content Calendar, June Edition

Get ready for this week’s post dedicated to Splunk Dashboards! We're celebrating the power of community by ...

What You Read The Most: Splunk Lantern’s Most Popular Articles!

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

See your relevant APM services, dashboards, and alerts in one place with the updated ...

As a Splunk Observability user, you have a lot of data you have to manage, prioritize, and troubleshoot on a ...