Sample DNS searches and dashboards
This topic lists searches that you can perform to confirm that Windows DNS data has arrived at the indexer.
If you're using TA-Windows v6.0.0, you don't need TA_AD and TA_DNS. TA_AD and TA_DNS are merged with TA-Windows v6.0.0.
Search Windows DNS data
To confirm that Windows DNS data is present on the indexer, use the Search app:
- Log into Splunk Enterprise on the indexer, if you have not already.
- Load the Search app. In the system bar, select Apps > Search & Reporting. Splunk loads the Search app.
- Try the following searches to confirm that data is present:
This search confirms that the Splunk Add-on for Windows DNS are sending data to the indexer:
eventtype=perfmon-dns
Can't find the data?
Try the following:
- Use Forwarder Management to confirm that the Splunk Add-on for Windows DNS have been deployed to your deployment clients.
- Refer to the Troubleshooting manual for additional help.
Confirm and troubleshoot DNS data collection | Install the Splunk App for Windows Infrastructure on the Search Head |
This documentation applies to the following versions of Splunk® App for Windows Infrastructure (Legacy): 1.5.2
Feedback submitted, thanks!