Getting Data In

Why does the .etl file stop receiving any new events on Windows 2012 Server on Splunk and is there another way to deliver DNS logs to Splunk?

lightech1
Path Finder

Hello everyone,

We have a universal forwarder installed on the Windows 2012 machine and we use the addons and PowerShell script to transmit the analytical DNS logs to Splunk, also we have followed this article from Microsoft:

https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn...

The problem is when the file .etl arrived at the limit manually configured (Example 500 MB), it stops delivering the logs to Splunk because it neither overwrite events on the file (configuration Microsoft Article) nor the file rotates to start a new one, so the .etl file does not receive any new event.

The questions:

Is there any another way to deliver the DNS logs to Splunk (without using the stream app)?
Has anybody had this problem with the.ETL file?

Thanks in advance.

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...