- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello Splunkers,
Whats is "the best practice" to ingest DNS logs inside a distributed Splunk environment. I hesitate between two possibilities (maybe there are others) :
- Install a UF on my DNS servers and simply monitor the path where my DNS logs are located and then forward the logs to my Splunk env.
- Or use the Stream App, which seems a little bit more complicated : https://docs.splunk.com/Documentation/StreamApp/8.1.1/DeployStreamApp/AboutSplunkStream
Let me know what you used / think about that,
Thanks a lot !
GaetanVP
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

This also depends on your DNS system and query volumes. If you have some real dns server/appliances or just Windows DC node wit DNS enable.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
We do UF on all our servers. To not make to more complicated we use the UF to monitor the DNS log files.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

This also depends on your DNS system and query volumes. If you have some real dns server/appliances or just Windows DC node wit DNS enable.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
In case of Windows DC node with DNS enable you would go for classic UF installation and monitoring ?
Thanks
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Yes it should work like this.
Personally I try to avoid windows dc dns, but that’s another story.
