<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ingestion issue from syslog-ng in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingestion-issue-from-syslog-ng/m-p/689367#M80667</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/223775"&gt;@norbertt911&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;if it's a random issue, I cannot help you.&lt;/P&gt;&lt;P&gt;If instead is a fixed (on some defined hosts) issue, youcan have, in your syslog-ng.conf, two templates: one for the issued hosts and one for the others, assigning the template by host name.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Mon, 03 Jun 2024 06:21:34 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2024-06-03T06:21:34Z</dc:date>
    <item>
      <title>Ingestion issue from syslog-ng</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingestion-issue-from-syslog-ng/m-p/689025#M80655</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Recently we replaced our Syslog server from rsyslog to syslog-ng.&amp;nbsp; We are collecting the network device's log - every source logged its own &amp;lt;IPaddress.log&amp;gt; file. Universal forwarder pushing them to the indexer.&amp;nbsp; Inputs, outputs are ok the data flowing, sourcetype is standard syslog. Everything is working as expected... Except for some sources... I spotted this because the log volume has dropped since the migration.&lt;/P&gt;&lt;P&gt;For those, I do not have all of the events in Splunk.&amp;nbsp; I can see the file on the syslog server, let's say there are 5 events per minute. The events are the same - for example, XY port is down - but not identical; the timestamp in the header and the timestamp in the event's message are different. (events are still the same length). So in the log file, there are 5 events/min, but in Splunk, I can see only one event per 5 minutes. The rest are missing... Splunk randomly picks ~10% of the events from the log file (all the extractions are ok for those, there is no special character or something in the "dropped" events...)&lt;/P&gt;&lt;P&gt;I feel it is because of similar events - Splunk thinks they are duplicated - but other hand it cannot be, because they are different. Any advice? Should I try to add some crc salt or try to change the sourcetype?&lt;/P&gt;&lt;P&gt;BR.&lt;BR /&gt;Norbert&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 19:00:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingestion-issue-from-syslog-ng/m-p/689025#M80655</guid>
      <dc:creator>norbertt911</dc:creator>
      <dc:date>2024-05-29T19:00:56Z</dc:date>
    </item>
    <item>
      <title>Re: Ingestion issue from syslog-ng</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingestion-issue-from-syslog-ng/m-p/689052#M80656</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/223775"&gt;@norbertt911&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;this isn't a Splunk question, but a Linux question.&lt;/P&gt;&lt;P&gt;Anyway, we had a similar issue with rsyslog and we soved changing the default template:&lt;/P&gt;&lt;P&gt;in rsysog, for each rule, you have&amp;nbsp;dynafile (in which you insert the template addressing the file to write) and template (by default "rsyslog-fmt", that you use to give a format to your output).&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 05:43:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingestion-issue-from-syslog-ng/m-p/689052#M80656</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-05-30T05:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: Ingestion issue from syslog-ng</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingestion-issue-from-syslog-ng/m-p/689315#M80665</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I checked your suggestion, but it did not solve my problem. There are about 200 hosts and about 3% are affected. (on the Syslog server everything works flawlessly.)&lt;/P&gt;&lt;P&gt;I have the same type of device logs which are not affected. For me, it's a random issue of the forwarding...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Norbert&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 10:56:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingestion-issue-from-syslog-ng/m-p/689315#M80665</guid>
      <dc:creator>norbertt911</dc:creator>
      <dc:date>2024-06-02T10:56:20Z</dc:date>
    </item>
    <item>
      <title>Re: Ingestion issue from syslog-ng</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingestion-issue-from-syslog-ng/m-p/689367#M80667</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/223775"&gt;@norbertt911&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;if it's a random issue, I cannot help you.&lt;/P&gt;&lt;P&gt;If instead is a fixed (on some defined hosts) issue, youcan have, in your syslog-ng.conf, two templates: one for the issued hosts and one for the others, assigning the template by host name.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 06:21:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingestion-issue-from-syslog-ng/m-p/689367#M80667</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-06-03T06:21:34Z</dc:date>
    </item>
  </channel>
</rss>

