Hello All,

Here is my question go through it!


Sysadmins set nxlog syslog to put event logs from windows to external directory. The log format is 'json' with extension *.log My question is how to properly import those data to splunk and index it. Right now SPLUNK don't recognize all fields (like a EventType, EventID, Hostname etc.)

thanks in advance

AskedMarch 1, 2018 - 5:54am

Answer (1)