Timestamp extraction forthe sourcetype DNS is not extracting properly. I am using Splunk_TA_microsoft_dns TA
Event- 24/06/2019 22:27:44 22BC PACKET 000002293478E4A0 UDP Snd 10.72.50.59 0...
I'm using theSplunkAdd-onfor Microsoft Windows to parse logs from a couple Windows 2019 DNS servers. Things seemed to be working OK, but we noticed some weird behavior with the src_domain field w...
I'm not seeing the Network Resolution/DNS datamodel/dataset populated from theSplunkAdd-onfor Microsoft WindowsDNS. Theadd-on was installed per the documentation on all WindowsDNS servers.
C...
Hey all, I'm new here (so to Splunk) then please be patient 😁 I wanted to know is there a way to collect data from Windows server 2008R2 and to view it through Splunkadd-onfor M...
I'm setting up Splunk to work with Windows environment and installed all the proper add-ons and apps. One of theadd-ons is SplunkAdd-ons forWindowsDNS, I'm searching through the app store but c...
...earch head are onthe same SPLUNK instance. Splunk version: 8.1.0 Splunk app forWindows Infrastructure v2.0.1 Splunk Supporting Add-onfor Microsoft Windows v7.0 Splunk Supporting Add-onfor...
hi splunkers,
I am installing splunkforWindows app in my windows environment. My server is 2012 R2. I followed the instructions in the docs.splunk.com, but I can't see my active directory data....
i have installed theSplunkAdd-onforWindows app to monitor DNS logs using the Debugging enabled option on my server. i am seeing the events ingesting with the proper source type of MSAD:NT6:DNS b...
...roupPolicyContainer)"
index = wineventlog
renderXml=false
I have check within Windows Event Viewer on our Domain Controller that Event 4662 is present, but Splunk searches for EventCode=4662 produce no r...