Here is my question go through it!
Sysadmins set nxlog syslog to put event logs from windows to external directory. The log format is 'json' with extension *.log My question is how to properly import those data to splunk and index it. Right now SPLUNK don't recognize all fields (like a EventType, EventID, Hostname etc.)
thanks in advance