Splunk Enterprise Security

Ingesting DNS Server logs

omri_p
Engager

I would like to forward DNS events from my DNS server with a UF that is monitoring the dns.log debug output.
i am already forwarding WIndows Events under sourcetype=wineventlog
based on https://docs.splunk.com/Documentation/WindowsAddOn/6.0.0/User/SourcetypesandCIMdatamodelinfo
DNS Logs would also need to be under the same sourcetype name in order for the add on https://splunkbase.splunk.com/app/742/

to normalize the events
i do not wish to use the same sourcetype name for the win events and for the DNS
what am i missing?

0 Karma

jawaharas
Motivator

If you want to use different sourcetype for DNS logs and want to utilize 'Splunk Add-on for Windows' for data normalization as per CIM, you can clone the configurations of 'wineventlog' sourcetype in 'props.conf' and rename the sourcetype to 'dns'.

Reference:
https://docs.splunk.com/Documentation/WindowsAddOn/6.0.0/User/Configuration

0 Karma

jawaharas
Motivator

@omri_p
Can you upvote and accept the answer if it's helped you? Thanks.

0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

 Ready to master Kubernetes and cloud monitoring like the pros? Join Splunk’s Growth Engineering team for an ...

Update Your SOAR Apps for Python 3.13: What Community Developers Need to Know

To Community SOAR App Developers - we're reaching out with an important update regarding Python 3.9's ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...