<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ise_servername Returning as Host of Syslog Server in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750582#M82151</link>
    <description>&lt;P&gt;Thanks. The server name is not in the sourcepath, but it is in the log right after the date.&lt;/P&gt;&lt;P&gt;Jul 27 23:01:51.020755 SDNWISEP0077 0018346907 (...)&lt;/P&gt;&lt;P&gt;I tried to use extract field from the event view, but that didn't work&lt;/P&gt;</description>
    <pubDate>Mon, 28 Jul 2025 16:33:13 GMT</pubDate>
    <dc:creator>cboillot</dc:creator>
    <dc:date>2025-07-28T16:33:13Z</dc:date>
    <item>
      <title>ise_servername Returning as Host of Syslog Server</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750571#M82149</link>
      <description>&lt;P&gt;Currently we have our Cisco ISE devices being sent to a syslog server and then a forwarder is bringing that into Splunk. We are running into an issue where&amp;nbsp;ise_servername is showing the device name, but the Syslog server name. What am I missing? How would I go about fixing this?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2025 15:54:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750571#M82149</guid>
      <dc:creator>cboillot</dc:creator>
      <dc:date>2025-07-28T15:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: ise_servername Returning as Host of Syslog Server</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750581#M82150</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/41812"&gt;@cboillot&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Does the host value have the correct source name, or does this show the syslog server too?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does the syslog server write the files to a folder structure that contains the source hostname that you need within it? e.g. /var/log/syslog/&amp;lt;deviceName/blah.log?&amp;nbsp;&lt;/P&gt;&lt;P&gt;If so you would be able to use the host_segment value&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.4.2/Admin/Inputsconf#:~:text=host_regex%27.%0A*%20No%20default.-,host_segment%20%3D%20%3Cinteger%3E,-*%20If%20set%20to" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.4.2/Admin/Inputsconf#:~:text=host_regex%27.%0A*%20No%20default.-,host_segment%20%3D%20%3Cinteger%3E,-*%20If%20set%20to&lt;/A&gt;&amp;nbsp;to specify the host as the source of the log.&lt;/P&gt;&lt;P&gt;AFAIK,&amp;nbsp;&lt;SPAN&gt;ise_servername ultimately comes from the 'host' field. If you cannot do the host_segment then another option is to use a REGEX props/transform to extract this from the raw event (assuming it is present there)? If the other option isnt possible and you'd like some further help wrtiting this then please provide a sample event.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2025 16:22:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750581#M82150</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-07-28T16:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: ise_servername Returning as Host of Syslog Server</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750582#M82151</link>
      <description>&lt;P&gt;Thanks. The server name is not in the sourcepath, but it is in the log right after the date.&lt;/P&gt;&lt;P&gt;Jul 27 23:01:51.020755 SDNWISEP0077 0018346907 (...)&lt;/P&gt;&lt;P&gt;I tried to use extract field from the event view, but that didn't work&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2025 16:33:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750582#M82151</guid>
      <dc:creator>cboillot</dc:creator>
      <dc:date>2025-07-28T16:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: ise_servername Returning as Host of Syslog Server</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750596#M82153</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/41812"&gt;@cboillot&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In that case, you could use props/transforms like this on the first HF/Indexer that the data hits:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;# props.conf
[your_sourcetype]
TRANSFORMS-host = ise_host_extraction

# transforms.conf
[ise_host_extraction]
# https://regex101.com/r/7VrxpN/1
REGEX = ^\S+\s+\S+\s+\S+\s+(\S+)
FORMAT = host::$1
DEST_KEY = MetaData:Host&lt;/LI-CODE&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="livehybrid_0-1753738327418.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/39763iB04DE13C6D09F176/image-size/medium?v=v2&amp;amp;px=400" role="button" title="livehybrid_0-1753738327418.png" alt="livehybrid_0-1753738327418.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2025 21:32:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750596#M82153</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-07-28T21:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: ise_servername Returning as Host of Syslog Server</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750611#M82155</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/41812"&gt;@cboillot&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are using syslog-ng, it is preferable to use the host_segment option to extract the host value. This approach helps avoid potential future issues caused by changes in hostname naming conventions or logging patterns that might break regex-based extraction.&lt;/P&gt;&lt;P&gt;You can configure the destination stanza in your syslog configuration file to include the device IP address dynamically in the log file path. Additionally, you can use the host_segment setting to extract the host value for indexing in Splunk.&lt;/P&gt;&lt;P&gt;syslog-ng .conf file&lt;BR /&gt;Eg: for destination stanza //Macro might be different if you are using rsyslog or any other&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;destination d_device_logs {
file("/var/log/syslog/$SOURCEIP/${YEAR}-${MONTH}-${DAY}.log");
};&lt;/LI-CODE&gt;&lt;P&gt;And update inputs.conf with host_segment&lt;BR /&gt;eg:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[monitor:///var/log/syslog/...]
host_segment = 4&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;But if you want to stick with regex extraction then use,&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;props.conf
[cisco:ise:syslog]
TRANSFORMS-set_host = ise_host_override

transforms.conf
[ise_host_override]
REGEX = ^\w+\s+\d+\s+\d+:\d+:\d+\.\d+\s+(\S+)
FORMAT = host::$1
DEST_KEY = MetaData:Host&lt;/LI-CODE&gt;&lt;P&gt;Regards,&lt;BR /&gt;Prewin&lt;BR /&gt;Splunk Enthusiast | Always happy to help! If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2025 06:18:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750611#M82155</guid>
      <dc:creator>PrewinThomas</dc:creator>
      <dc:date>2025-07-29T06:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: ise_servername Returning as Host of Syslog Server</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750664#M82157</link>
      <description>&lt;P&gt;I'm going to have to go down the Regex path as the Networking team doesn't want to change how their side is set up.&lt;BR /&gt;&lt;BR /&gt;&lt;STRIKE&gt;I want to double check, this would go on the indexer, correct?&lt;/STRIKE&gt; I missed the "on the first HF/Indexer"&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2025 18:53:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/ise-servername-Returning-as-Host-of-Syslog-Server/m-p/750664#M82157</guid>
      <dc:creator>cboillot</dc:creator>
      <dc:date>2025-07-29T18:53:55Z</dc:date>
    </item>
  </channel>
</rss>

