Getting Data In

Capture Forwarded syslog events from a syslog server

ngcgoon
Explorer

I have setup a forwarder on a syslog-ng server to an indexer which is my webhead. I have setup an index (host-syslog) and my data input is /var/log/messages tied to that index and either the default app or unix.(The platform is linux). I have also setup a light forwarder on another syslog-ng server forwarding the events to my indexer. Somehow I can't search the webhead for events from a fowarder unless I am missing something. So on the indexer I use: host="syslog-server-host1" source ="/var/log/messages" and sourcetype = syslog. When this runs I do not get any current events and I get very few events at that. I have over 10 million lines of syslog-ng entries before the log rotates on average. Any suggestions on setup or searching?

In is there a way to make forwarded events goto a specific index on the index server? I'm using the current version 4.1.3 for linux.

Thanks any help is appreciated.

Tags (2)
0 Karma

kristian_kolb
Ultra Champion

Are you sure that you are actually searching in your dedicated syslog-index? You didn't specifically mention it.

index=host-syslog sourcetype=syslog host=syslog-server-host1 etc etc.

BR,

Kristian

0 Karma

Genti
Splunk Employee
Splunk Employee

it should be easy to achieve by the following (or similar input stanza)
[monitor:///var/log/messages/]
sourcetype = syslog
index = chosen-one

It would be beneficial to show us what the current configuration is so that we can take a peak and if needed, edit the necessary bits.

Cheers!

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...