<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk 6.2/NetScaler 10.1 Configuration in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-6-2-NetScaler-10-1-Configuration/m-p/192497#M73067</link>
    <description>&lt;P&gt;This can be closed out. I got it resolved. The handshakes show up because it's a ton of info. But if you actually start filtering things out you see a ton of information.&lt;/P&gt;

&lt;P&gt;Sorry for the waste of time. I am new to a lot of this stuff.&lt;/P&gt;</description>
    <pubDate>Mon, 11 May 2015 21:09:21 GMT</pubDate>
    <dc:creator>LouPetridish</dc:creator>
    <dc:date>2015-05-11T21:09:21Z</dc:date>
    <item>
      <title>Splunk 6.2/NetScaler 10.1 Configuration</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-6-2-NetScaler-10-1-Configuration/m-p/192496#M73066</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I have a NetScaler in my environment setup to send the Syslog files to Splunk 6.2. It's configured to send "all" of the events available. I can modify this later but I just want to see the data flow through into Splunk.&lt;/P&gt;

&lt;P&gt;Currently when I look at the Splunk web console with the NetScaler App installed all I see is the "SSLLOG SSL_HANDSHAKE_SUCCESS" events. I would think it would send me everything that I included under all such as 'error', 'critical', 'emergency', 'warning'....&lt;/P&gt;

&lt;P&gt;Any thoughts?&lt;/P&gt;

&lt;P&gt;Thank you,&lt;BR /&gt;
Luke&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:56:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-6-2-NetScaler-10-1-Configuration/m-p/192496#M73066</guid>
      <dc:creator>LouPetridish</dc:creator>
      <dc:date>2020-09-28T19:56:41Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6.2/NetScaler 10.1 Configuration</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-6-2-NetScaler-10-1-Configuration/m-p/192497#M73067</link>
      <description>&lt;P&gt;This can be closed out. I got it resolved. The handshakes show up because it's a ton of info. But if you actually start filtering things out you see a ton of information.&lt;/P&gt;

&lt;P&gt;Sorry for the waste of time. I am new to a lot of this stuff.&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2015 21:09:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-6-2-NetScaler-10-1-Configuration/m-p/192497#M73067</guid>
      <dc:creator>LouPetridish</dc:creator>
      <dc:date>2015-05-11T21:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6.2/NetScaler 10.1 Configuration</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-6-2-NetScaler-10-1-Configuration/m-p/192498#M73068</link>
      <description>&lt;P&gt;Hi Lou, &lt;/P&gt;

&lt;P&gt;What App did you use for this. We are running on 10.5 version of NS and want to use an app to get field extractions in Splunk. However, the app I found online works only with 9.X release of NS. Appreciate your answer.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2016 22:13:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-6-2-NetScaler-10-1-Configuration/m-p/192498#M73068</guid>
      <dc:creator>cshah2</dc:creator>
      <dc:date>2016-01-22T22:13:10Z</dc:date>
    </item>
  </channel>
</rss>

