Hey, what you're using looks like the "old" Microsoft DNS debug logs, where everything is written to a single file in a pretty terrible format.
The Windows DNS TA however refers in it's installation instructions to this microsoft article, which tells you that you need either Windows Server 2012R2 or 2016, and requires a certain hotfix installed in case of 2012R2.
So, you gotta follow that article, enable the proper logging, and the TA will then work with that data. The older debug style logs are not supported by the TA and are actually quite terrible 😉
Edit:
You're right - the regexes match the old debug log style, but the linked article in the installation manual points to the new method.
Whatever, if it works for you, let's try the timestamp recognition.
TIME_FORMAT = %d/%m/%Y %H:%M:%S
This also includes the time, maybe this works better. The timestamp you get is a common format, also in the US day + month are twisted. Splunk recognizes such timestamps by default, so no configuration is needed, and therefore you don't see it in the TA's default props.conf. BTW, this config should go on the first HF/indexer the data goes to.
If this doesn't work out, please run this on the CLI:
/opt/splunk/bin/splunk btool props list MSAD:NT6:DNS --debug and post the output as a comment here.
Hope that helps - if it does I'd be happy if you would upvote/accept this answer, so others could profit from it. 🙂
... View more