Getting Data In

Retrieve Windows DNS Logs - best practices ?

GaetanVP
Contributor

Hello Splunkers,

Whats is "the best practice" to ingest DNS logs inside a distributed Splunk environment.  I hesitate between two possibilities (maybe there are others) :

- Install a UF on my DNS servers and simply monitor the path where my DNS logs are located and then forward the logs to my Splunk env.

-  Or use the Stream App, which seems a little bit more complicated : https://docs.splunk.com/Documentation/StreamApp/8.1.1/DeployStreamApp/AboutSplunkStream

Let me know what you used / think about that,

Thanks a lot !

GaetanVP

 

Labels (2)
0 Karma
1 Solution

isoutamo
SplunkTrust
SplunkTrust

This also depends on your DNS system and query volumes. If you have some real dns server/appliances or just Windows DC node wit DNS enable. 

View solution in original post

jotne
Builder

We do UF on all our servers.  To not make to more complicated we use the UF to monitor the DNS log files. 

isoutamo
SplunkTrust
SplunkTrust

This also depends on your DNS system and query volumes. If you have some real dns server/appliances or just Windows DC node wit DNS enable. 

GaetanVP
Contributor

In case of Windows DC node with DNS enable you would go for classic UF installation and monitoring ?

Thanks 

0 Karma

isoutamo
SplunkTrust
SplunkTrust

Yes it should work like this.

Personally I try to avoid windows dc dns, but that’s another story.

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...