<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using Ubuntu with Universal Forwarder to sent logs in SPLUNK - Dilemmas and Questions in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/650582#M16827</link>
    <description>&lt;P&gt;I'm sharing here the final version of syslog-ng.conf that worked on trimming part of fortigate logs. However i noticed that license is being consumed like before &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;@version: 3.35&lt;/DIV&gt;&lt;DIV&gt;@include "scl.conf"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;# Syslog-ng configuration file, compatible with default Debian syslogd&lt;/DIV&gt;&lt;DIV&gt;# installation.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;# First, set some global options.&lt;/DIV&gt;&lt;DIV&gt;options {&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; chain_hostnames(off);&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; flush_lines(0);&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; use_dns(no);&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; use_fqdn(no);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; owner("root");&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; group("adm");&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; perm(0640);&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; stats_freq(0);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; bad_hostname("^gconfd$");&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; create_dirs(yes);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; keep_hostname(yes);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; log_fifo_size(2048);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; log_msg_size(8192);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; time_reopen(10);&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;# Adding param to make syslog-ng listen on udp/514 for syslog&lt;/DIV&gt;&lt;DIV&gt;source s_net {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; udp(port(514));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;# Adding destination for local file to receive FortiGate logs&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;destination d_fortinet_fortigate {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; file("/root/syslog/logs/fortinet/fortigate/$HOST/$YEAR-$MONTH-$DAY-fortinet-fortigate.log" create_dirs(yes));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;destination d_fortinet_fortiweb {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; file("/root/syslog/logs/fortinet/fortiweb/$HOST/$YEAR-$MONTH-$DAY-fortinet-fortiweb.log" create_dirs(yes));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;destination d_fortinet_fortiauthenticator {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; file("/root/syslog/logs/fortinet/fortiauthenticator/$HOST/$YEAR-$MONTH-$DAY-fortinet-fortiauthenticator.log" create_dirs(yes));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;destination d_fortinet_fortimail {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; file("/root/syslog/logs/fortinet/fortimail/$HOST/$YEAR-$MONTH-$DAY-fortinet-fortimail.log" create_dirs(yes));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;# Filter to instruct syslog-ng how to identify FortiGate syslog&lt;/DIV&gt;&lt;DIV&gt;filter f_fortinet_fortigate {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; match("devid=\"FG[A-Z0-9]+\"" value("MESSAGE"));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;filter f_fortinet_fortiweb {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; match("device_id=FV[A-Z0-9]+" value("MESSAGE"));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;filter f_fortinet_fortiauthenticator {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; match("subcategory=\"Authentication\"" value("MESSAGE"));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;filter f_fortinet_fortimail {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; match("device_id=FE[A-Z0-9]+" value("MESSAGE"));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;# Trimming different parts together for logging&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;rewrite rewrite_fortigate {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;#subst ( '^time=\d\d:\d\d:\d\d(\.\d{3,6})? ', "", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' devid="[A-Z0-9]{16}" ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' logid="[0-9]{10}" ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' srcname="([\w-]+)\.example\.local" ', ' srcname="$1" ', value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' srcintfrole="[a-z]+" ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' dstname="([\w-]+)\.example\.local" ', ' dstname="$1" ', value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' dstintfrole="[a-z]+" ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' poluuid="[a-z0-9-]{36}" ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' sessionid=[0-9]+ ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' policytype="policy" ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' appcat="unscanned"', "", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' crscore=[0-9]+ craction=[0-9]+ crlevel="[a-z]+"', "", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' attackid=[0-9]+ ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' incidentserialno=[0-9]+ ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' ref="http:\/\/www\.fortinet\.com\/ids\/VID[0-9]+"', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' msg="application[s]?([0-9]+)?:[^.]+.[^.]+.[^.]+.[^.]+.[^.]+"', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;# Creating the different parts together for logging&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;log {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; source(s_net);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; filter(f_fortinet_fortigate);&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;rewrite(rewrite_fortigate);&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; destination(d_fortinet_fortigate);&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;log {&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; source(s_net);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; filter(f_fortinet_fortiweb);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; destination(d_fortinet_fortiweb);&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;log {&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; source(s_net);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; filter(f_fortinet_fortiauthenticator);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; destination(d_fortinet_fortiauthenticator);&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;log {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; source(s_net);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; filter(f_fortinet_fortimail);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; destination(d_fortinet_fortimail);&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;###&lt;/DIV&gt;&lt;DIV&gt;# Include all config files in /etc/syslog-ng/conf.d/&lt;/DIV&gt;&lt;DIV&gt;###&lt;/DIV&gt;&lt;DIV&gt;@include "/etc/syslog-ng/conf.d/*.conf"&lt;/DIV&gt;</description>
    <pubDate>Fri, 14 Jul 2023 14:59:21 GMT</pubDate>
    <dc:creator>ornaldo</dc:creator>
    <dc:date>2023-07-14T14:59:21Z</dc:date>
    <item>
      <title>Using Ubuntu with Universal Forwarder to sent logs in SPLUNK - Dilemmas and Questions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649956#M16777</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;&lt;P&gt;There are a lot of articles videos in youtube etc but at some point it is becoming so so confusing so i'm asking for a little help here.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Topic:&lt;/STRONG&gt; I want to use a syslog ng server in Ubuntu in order Trimming&amp;nbsp; and send logs to SPLUNK&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What i have done so far:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Installed an Ubuntu Server (Ubuntu 22.04.2 LTS)&lt;/LI&gt;&lt;LI&gt;Installed the universal forwarder (splunkforwarder-9.1.0.1-77f73c9edb85-linux-2)&lt;/LI&gt;&lt;LI&gt;Installed syslog-ng&lt;/LI&gt;&lt;LI&gt;Configured inputs.conf in&amp;nbsp;/opt/splunkforwarder/etc/apps/search/local&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;EM&gt;# FortiGate&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[monitor:///root/syslog/logs/fortinet/fortigate/*/*.log]&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sourcetype = fgt_log&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;index = fortigate&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;disabled = false&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;host_segment = 6&lt;/EM&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configured outputs.conf in&amp;nbsp;/opt/splunkforwarder/etc/system/local&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;EM&gt;[tcpout]&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;defaultGroup = default-autolb-group&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;[tcpout:default-autolb-group]&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;server = X.X.X.X.9997&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;[tcpout-server://1X.X.X.X.:9997]&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;useACK = true&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;useSSL = true&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;clientCert = $SPLUNK_HOME/etc/auth/XXX/server.pem&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sslRootCAPath = $SPLUNK_HOME/etc/auth/XXX/cacert.pem&lt;/EM&gt;&lt;EM&gt;[tcpout-server://X.X.X.X:9997]&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sslVerifyServerCert = true&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sslAltNameToCheck = XXXX&lt;/EM&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configured the certs&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;What is wrong?:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;There are a lot of output.conf and input.conf directories. Which is the correct one ?&lt;/LI&gt;&lt;LI&gt;In SPLUNK i can see that logs are coming using&amp;nbsp;index=_internal&amp;nbsp; but there are not the logs of fortigate&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;07-11-2023 12:48:48.579 +0200 INFO AutoLoadBalancedConnectionStrategy [2746 TcpOutEloop] - Found currently active indexer. Connected to idx=10.10.10.203:9997:0, reuse=1.&lt;BR /&gt;date_hour = 12date_mday = 11date_minute = 48date_month = julydate_second = 48date_wday = tuesdaydate_year = 2023date_zone = 120eventtype = splunkd-loghost = syslogsrvindex = _internallinecount = 1punct = --_::._+____[_]_-____.___=...::,_=.source = /opt/splunkforwarder/var/log/splunk/splunkd.logsourcetype = splunkdsplunk_server = splunktimeendpos = 29timestartpos = 0&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Also i noticed that some of the logs of fortigate are under index=main.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 11 Jul 2023 10:51:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649956#M16777</guid>
      <dc:creator>ornaldo</dc:creator>
      <dc:date>2023-07-11T10:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: Using Ubuntu with Universal Forwarder to sent logs in SPLUNK - Dilemmas and Questions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649964#M16778</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/258228"&gt;@ornaldo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Here are some thoughts regarding your porst :&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000080"&gt;- There are a lot of output.conf and input.conf directories. Which is the correct one ?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Indeed, you can have multiple inputs.conf and outputs.conf Splunk files configured on a machine. Splunk will basically merged all of those file with a specific precedence.&lt;/P&gt;&lt;P&gt;More info here : &lt;A href="https://docs.splunk.com/Documentation/Splunk/9.1.0/Admin/Wheretofindtheconfigurationfiles" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.1.0/Admin/Wheretofindtheconfigurationfiles&lt;/A&gt;&lt;/P&gt;&lt;P&gt;In your case, I think this is precedence that will be "follow"&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GaetanVP_0-1689074775826.png" style="width: 672px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/26202i4D18BB9D023D6505/image-dimensions/672x178?v=v2" width="672" height="178" role="button" title="GaetanVP_0-1689074775826.png" alt="GaetanVP_0-1689074775826.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;It is not really the best practice to put inputs.conf and outputs.conf directly in&amp;nbsp;&lt;SPAN&gt;/opt/splunkforwarder/etc/system/local of a Universal Forwarder because some configuration could be overridden&amp;nbsp;by same *.conf file located in&amp;nbsp;/opt/splunkforwarder/etc/apps/&amp;lt;my_apps&amp;gt;/...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Another way to list the final merged that Splunk did for a specific configuration is the following commands :&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;/opt/splunkforwarder/bin/splunk btool inputs list --debug
/opt/splunkforwarder/bin/splunk btool outputs list --debug&lt;/LI-CODE&gt;&lt;P&gt;This will display what configuration are applied and where it is located, can be useful to debug.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000080"&gt;- In SPLUNK i can see that logs are coming using&amp;nbsp;index=_internal&amp;nbsp; but there are not the logs of fortigate&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Yes by default after the UF installation, Splunk will try to forward all the Splunk internal related logs to the tcpout defined. The logs forwarded are for instance located in /opt/&lt;SPAN&gt;splunkforwarder&lt;/SPAN&gt;/var/log/splunk&lt;/P&gt;&lt;P&gt;Using the first point, if you want to learn more about what is monitored and how it's forward to your indexer, you can use :&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;/opt/splunkforwarder/bin/splunk btool inputs list --debug | grep -i _internal&lt;/LI-CODE&gt;&lt;P&gt;You will be able to locate all the apps containing conf files responsible of sending logs to the "_internal" index.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps !&lt;BR /&gt;GaetanVP&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 11:37:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649964#M16778</guid>
      <dc:creator>GaetanVP</dc:creator>
      <dc:date>2023-07-11T11:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: Using Ubuntu with Universal Forwarder to sent logs in SPLUNK - Dilemmas and Questions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649973#M16780</link>
      <description>&lt;P&gt;Hi, thank you for your reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry but i'm still confused.&amp;nbsp; In SPLUNK i can see that logs are comming under index="main" sourcetype="fortigate_traffic"&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 11:58:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649973#M16780</guid>
      <dc:creator>ornaldo</dc:creator>
      <dc:date>2023-07-11T11:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: Using Ubuntu with Universal Forwarder to sent logs in SPLUNK - Dilemmas and Questions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649975#M16781</link>
      <description>&lt;P&gt;Yes when you create/modified an inputs.conf file, and do not specify anything in front of the "index" key, Splunk will by default forward the logs to the&amp;nbsp;&lt;SPAN&gt;main index.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I suppose you missed to configure the targeted index in one of your inputs.conf file, to find it you can once again use the btool command to locate the conf file that you will need to modify !&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;/opt/splunkforwarder/bin/splunk btool inputs list --debug | grep -i fortigate
/opt/splunkforwarder/bin/splunk btool sourcetypes list --debug | grep -i fortigate&lt;/LI-CODE&gt;&lt;P&gt;This should return the path where you specified the sourcetype for incoming fortigate data.&lt;/P&gt;&lt;P&gt;Let me know how it went !&lt;BR /&gt;GaetanVP&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 12:02:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649975#M16781</guid>
      <dc:creator>GaetanVP</dc:creator>
      <dc:date>2023-07-11T12:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: Using Ubuntu with Universal Forwarder to sent logs in SPLUNK - Dilemmas and Questions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649976#M16782</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/258228"&gt;@ornaldo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure the&amp;nbsp; inputs.conf in &lt;SPAN&gt;splunk/etc/system/local/inputs.conf&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;if you use the btool precedence command you get to know why the data is going in main index&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 12:21:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649976#M16782</guid>
      <dc:creator>venky1544</dc:creator>
      <dc:date>2023-07-11T12:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Using Ubuntu with Universal Forwarder to sent logs in SPLUNK - Dilemmas and Questions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649977#M16783</link>
      <description>&lt;P&gt;The output of the first debug is:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;/opt/splunkforwarder/etc/apps/search/local/inputs.conf&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [monitor:///root/syslog/logs/fortinet/fortigate/*/*.log]&lt;BR /&gt;/opt/splunkforwarder/etc/apps/search/local/inputs.conf&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; index = fortigate&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The output of the second debug is empty&lt;/P&gt;&lt;P&gt;thnx&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 12:07:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649977#M16783</guid>
      <dc:creator>ornaldo</dc:creator>
      <dc:date>2023-07-11T12:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: Using Ubuntu with Universal Forwarder to sent logs in SPLUNK - Dilemmas and Questions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649978#M16784</link>
      <description>&lt;P&gt;I have used a default syslog-ng.conf that i have found in the internet:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;@version: 3.13&lt;BR /&gt;@include "scl.conf"&lt;/P&gt;&lt;P&gt;# Syslog-ng configuration file, compatible with default Debian syslogd&lt;BR /&gt;# installation.&lt;/P&gt;&lt;P&gt;# First, set some global options.&lt;BR /&gt;options {&lt;BR /&gt;chain_hostnames(off);&lt;BR /&gt;flush_lines(0);&lt;BR /&gt;use_dns(no);&lt;BR /&gt;use_fqdn(no);&lt;BR /&gt;owner("root");&lt;BR /&gt;group("adm");&lt;BR /&gt;perm(0640);&lt;BR /&gt;stats_freq(0);&lt;BR /&gt;bad_hostname("^gconfd$");&lt;BR /&gt;create_dirs(yes);&lt;BR /&gt;keep_hostname(yes);&lt;BR /&gt;log_fifo_size(2048);&lt;BR /&gt;log_msg_size(8192);&lt;BR /&gt;time_reopen(10);&lt;BR /&gt;};&lt;BR /&gt;# Adding param to make syslog-ng listen on udp/514 for syslog&lt;BR /&gt;source s_net {&lt;BR /&gt;udp(port(514));&lt;BR /&gt;};&lt;BR /&gt;# Adding destination for local file to receive FortiGate logs&lt;/P&gt;&lt;P&gt;destination d_fortinet_fortigate {&lt;BR /&gt;file("/root/syslog/logs/fortinet/fortigate/$HOST/$YEAR-$MONTH-$DAY-fortinet-fortigate.log" create_dirs(yes));&lt;BR /&gt;};&lt;/P&gt;&lt;P&gt;destination d_fortinet_fortiweb {&lt;BR /&gt;file("/root/syslog/logs/fortinet/fortiweb/$HOST/$YEAR-$MONTH-$DAY-fortinet-fortiweb.log" create_dirs(yes));&lt;BR /&gt;};&lt;/P&gt;&lt;P&gt;destination d_fortinet_fortiauthenticator {&lt;BR /&gt;file("/root/syslog/logs/fortinet/fortiauthenticator/$HOST/$YEAR-$MONTH-$DAY-fortinet-fortiauthenticator.log" create_dirs(yes));&lt;BR /&gt;};&lt;/P&gt;&lt;P&gt;destination d_fortinet_fortimail {&lt;BR /&gt;file("/root/syslog/logs/fortinet/fortimail/$HOST/$YEAR-$MONTH-$DAY-fortinet-fortimail.log" create_dirs(yes));&lt;BR /&gt;};&lt;BR /&gt;# Filter to instruct syslog-ng how to identify FortiGate syslog&lt;BR /&gt;filter f_fortinet_fortigate {&lt;BR /&gt;match("devid=\"FG[A-Z0-9]+\"" value("MESSAGE"));&lt;BR /&gt;};&lt;/P&gt;&lt;P&gt;filter f_fortinet_fortiweb {&lt;BR /&gt;match("device_id=FV[A-Z0-9]+" value("MESSAGE"));&lt;BR /&gt;};&lt;/P&gt;&lt;P&gt;filter f_fortinet_fortiauthenticator {&lt;BR /&gt;match("subcategory=\"Authentication\"" value("MESSAGE"));&lt;BR /&gt;};&lt;/P&gt;&lt;P&gt;filter f_fortinet_fortimail {&lt;BR /&gt;match("device_id=FE[A-Z0-9]+" value("MESSAGE"));&lt;BR /&gt;};&lt;BR /&gt;# Creating the different parts together for logging&lt;/P&gt;&lt;P&gt;log {&lt;BR /&gt;source(s_net);&lt;BR /&gt;filter(f_fortinet_fortigate);&lt;BR /&gt;destination(d_fortinet_fortigate);&lt;BR /&gt;};&lt;/P&gt;&lt;P&gt;log {&lt;BR /&gt;source(s_net);&lt;BR /&gt;filter(f_fortinet_fortiweb);&lt;BR /&gt;destination(d_fortinet_fortiweb);&lt;BR /&gt;};&lt;/P&gt;&lt;P&gt;log {&lt;BR /&gt;source(s_net);&lt;BR /&gt;filter(f_fortinet_fortiauthenticator);&lt;BR /&gt;destination(d_fortinet_fortiauthenticator);&lt;BR /&gt;};&lt;/P&gt;&lt;P&gt;log {&lt;BR /&gt;source(s_net);&lt;BR /&gt;filter(f_fortinet_fortimail);&lt;BR /&gt;destination(d_fortinet_fortimail);&lt;BR /&gt;};&lt;BR /&gt;###&lt;BR /&gt;# Include all config files in /etc/syslog-ng/conf.d/&lt;BR /&gt;###&lt;BR /&gt;@include "/etc/syslog-ng/conf.d/*.conf"&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 12:09:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/649978#M16784</guid>
      <dc:creator>ornaldo</dc:creator>
      <dc:date>2023-07-11T12:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: Using Ubuntu with Universal Forwarder to sent logs in SPLUNK - Dilemmas and Questions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/650582#M16827</link>
      <description>&lt;P&gt;I'm sharing here the final version of syslog-ng.conf that worked on trimming part of fortigate logs. However i noticed that license is being consumed like before &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;@version: 3.35&lt;/DIV&gt;&lt;DIV&gt;@include "scl.conf"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;# Syslog-ng configuration file, compatible with default Debian syslogd&lt;/DIV&gt;&lt;DIV&gt;# installation.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;# First, set some global options.&lt;/DIV&gt;&lt;DIV&gt;options {&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; chain_hostnames(off);&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; flush_lines(0);&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; use_dns(no);&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; use_fqdn(no);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; owner("root");&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; group("adm");&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; perm(0640);&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; stats_freq(0);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; bad_hostname("^gconfd$");&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; create_dirs(yes);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; keep_hostname(yes);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; log_fifo_size(2048);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; log_msg_size(8192);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; time_reopen(10);&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;# Adding param to make syslog-ng listen on udp/514 for syslog&lt;/DIV&gt;&lt;DIV&gt;source s_net {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; udp(port(514));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;# Adding destination for local file to receive FortiGate logs&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;destination d_fortinet_fortigate {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; file("/root/syslog/logs/fortinet/fortigate/$HOST/$YEAR-$MONTH-$DAY-fortinet-fortigate.log" create_dirs(yes));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;destination d_fortinet_fortiweb {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; file("/root/syslog/logs/fortinet/fortiweb/$HOST/$YEAR-$MONTH-$DAY-fortinet-fortiweb.log" create_dirs(yes));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;destination d_fortinet_fortiauthenticator {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; file("/root/syslog/logs/fortinet/fortiauthenticator/$HOST/$YEAR-$MONTH-$DAY-fortinet-fortiauthenticator.log" create_dirs(yes));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;destination d_fortinet_fortimail {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; file("/root/syslog/logs/fortinet/fortimail/$HOST/$YEAR-$MONTH-$DAY-fortinet-fortimail.log" create_dirs(yes));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;# Filter to instruct syslog-ng how to identify FortiGate syslog&lt;/DIV&gt;&lt;DIV&gt;filter f_fortinet_fortigate {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; match("devid=\"FG[A-Z0-9]+\"" value("MESSAGE"));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;filter f_fortinet_fortiweb {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; match("device_id=FV[A-Z0-9]+" value("MESSAGE"));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;filter f_fortinet_fortiauthenticator {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; match("subcategory=\"Authentication\"" value("MESSAGE"));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;filter f_fortinet_fortimail {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; match("device_id=FE[A-Z0-9]+" value("MESSAGE"));&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;# Trimming different parts together for logging&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;rewrite rewrite_fortigate {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;#subst ( '^time=\d\d:\d\d:\d\d(\.\d{3,6})? ', "", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' devid="[A-Z0-9]{16}" ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' logid="[0-9]{10}" ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' srcname="([\w-]+)\.example\.local" ', ' srcname="$1" ', value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' srcintfrole="[a-z]+" ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' dstname="([\w-]+)\.example\.local" ', ' dstname="$1" ', value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' dstintfrole="[a-z]+" ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' poluuid="[a-z0-9-]{36}" ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' sessionid=[0-9]+ ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' policytype="policy" ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' appcat="unscanned"', "", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' crscore=[0-9]+ craction=[0-9]+ crlevel="[a-z]+"', "", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' attackid=[0-9]+ ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' incidentserialno=[0-9]+ ', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' ref="http:\/\/www\.fortinet\.com\/ids\/VID[0-9]+"', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subst ( ' msg="application[s]?([0-9]+)?:[^.]+.[^.]+.[^.]+.[^.]+.[^.]+"', " ", value("MESSAGE") );&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;# Creating the different parts together for logging&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;log {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; source(s_net);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; filter(f_fortinet_fortigate);&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;rewrite(rewrite_fortigate);&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; destination(d_fortinet_fortigate);&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;log {&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; source(s_net);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; filter(f_fortinet_fortiweb);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; destination(d_fortinet_fortiweb);&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;log {&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; source(s_net);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; filter(f_fortinet_fortiauthenticator);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; destination(d_fortinet_fortiauthenticator);&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;log {&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; source(s_net);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; filter(f_fortinet_fortimail);&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; destination(d_fortinet_fortimail);&lt;/DIV&gt;&lt;DIV&gt;};&lt;/DIV&gt;&lt;DIV&gt;###&lt;/DIV&gt;&lt;DIV&gt;# Include all config files in /etc/syslog-ng/conf.d/&lt;/DIV&gt;&lt;DIV&gt;###&lt;/DIV&gt;&lt;DIV&gt;@include "/etc/syslog-ng/conf.d/*.conf"&lt;/DIV&gt;</description>
      <pubDate>Fri, 14 Jul 2023 14:59:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Using-Ubuntu-with-Universal-Forwarder-to-sent-logs-in-SPLUNK/m-p/650582#M16827</guid>
      <dc:creator>ornaldo</dc:creator>
      <dc:date>2023-07-14T14:59:21Z</dc:date>
    </item>
  </channel>
</rss>

