<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using Splunk indexer as a syslog forwarder in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148275#M2042</link>
    <description>&lt;P&gt;Currently we don't have any Splunk forwarders installed in our environment.  We've gotten a request from the security group to see if we can forward the Syslog messages (sourced by z/Linux servers) to an ArcSight server.  We still want to index the data, but would like to forward (in raw syslog format) to ArcSight.  Can this be done on the Splunk indexer?&lt;/P&gt;</description>
    <pubDate>Wed, 30 Apr 2014 20:04:14 GMT</pubDate>
    <dc:creator>jojoridge</dc:creator>
    <dc:date>2014-04-30T20:04:14Z</dc:date>
    <item>
      <title>Using Splunk indexer as a syslog forwarder</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148275#M2042</link>
      <description>&lt;P&gt;Currently we don't have any Splunk forwarders installed in our environment.  We've gotten a request from the security group to see if we can forward the Syslog messages (sourced by z/Linux servers) to an ArcSight server.  We still want to index the data, but would like to forward (in raw syslog format) to ArcSight.  Can this be done on the Splunk indexer?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2014 20:04:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148275#M2042</guid>
      <dc:creator>jojoridge</dc:creator>
      <dc:date>2014-04-30T20:04:14Z</dc:date>
    </item>
    <item>
      <title>Re: Using Splunk indexer as a syslog forwarder</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148276#M2043</link>
      <description>&lt;P&gt;See this.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://answers.splunk.com/answers/5807/output-syslog-to-external-system"&gt;http://answers.splunk.com/answers/5807/output-syslog-to-external-system&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2014 20:26:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148276#M2043</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2014-04-30T20:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: Using Splunk indexer as a syslog forwarder</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148277#M2044</link>
      <description>&lt;P&gt;So I take it that you want to take all syslog log entries that are being received by the system running the indexer and send it also to the ArcSight server. If that is the case, I don't know how to do it with splunk, because the way the documentation looks to me is that you can send a certain subset of the syslog data somewhere else, but it does not say anything about whether or not it also indexes the data. I'm looking here:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.1/Forwarding/Forwarddatatothird-partysystemsd#Send_a_subset_of_data_to_a_syslog_server" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/6.0.1/Forwarding/Forwarddatatothird-partysystemsd#Send_a_subset_of_data_to_a_syslog_server&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Unless someone answers here differently or you try it yourself I'd assume you can do one or the other.&lt;/P&gt;

&lt;P&gt;I have a similar issue. While most of my data is sent by forwarders, some is sent via syslog. And I needed to have that data also go somewhere else. As I did not have control over the environment sending me the syslog data, I came up with my own solution which might work for you.&lt;/P&gt;

&lt;P&gt;What I do is to take their syslog data on my system running syslog-ng. Syslog-ng then sends it to two destinations:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Another system that I want the syslog data on.&lt;/LI&gt;
&lt;LI&gt;To another port on my indexer that splunk listens to&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;This is working well. But the easiest thing would be to have the originating systems send the syslog data to both splunk and other ArcSight system if you have control over those. If not, then what I am doing is quite doable.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:30:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148277#M2044</guid>
      <dc:creator>wrangler2x</dc:creator>
      <dc:date>2020-09-28T16:30:39Z</dc:date>
    </item>
    <item>
      <title>Re: Using Splunk indexer as a syslog forwarder</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148278#M2045</link>
      <description>&lt;P&gt;Using syslog-ng is definitely the most flexible option. I agree the documentation is unclear regarding whether the data is also indexed. We have in the past implemented a custom alert script that allows Splunk to selectively forward events found by a search (realtime or scheduled) via syslog.&lt;/P&gt;</description>
      <pubDate>Thu, 01 May 2014 04:03:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148278#M2045</guid>
      <dc:creator>mcmaster</dc:creator>
      <dc:date>2014-05-01T04:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: Using Splunk indexer as a syslog forwarder</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148279#M2046</link>
      <description>&lt;P&gt;I like the syslog-ng approach, but we don't currently have any additional servers in the path between the z/Linux servers and the Splunk indexer.  The infrastructure/networking guys would like to keep it that way.  &lt;/P&gt;

&lt;P&gt;Via leads generated by these responses and additional research, we appear to have arrived at a working configuration.  NOTE: we haven't moved to production or tested heavily yet, but seems OK on the surface.&lt;/P&gt;

&lt;P&gt;The 2 main references I found most helpful were:  &lt;/P&gt;

&lt;P&gt;&lt;A href="http://wiki.splunk.com/Community:Test:How_Splunk_behaves_when_receiving_or_forwarding_udp_data" target="_blank"&gt;http://wiki.splunk.com/Community:Test:How_Splunk_behaves_when_receiving_or_forwarding_udp_data&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.1/Forwarding/Forwarddatatothird-partysystemsd#Send_a_subset_of_data_to_a_syslog_server" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/6.0.1/Forwarding/Forwarddatatothird-partysystemsd#Send_a_subset_of_data_to_a_syslog_server&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Wanted to document the changes made to hopefully assist others.&lt;/P&gt;

&lt;P&gt;Following changes were made to Splunk UAT to test whether we can get syslog forwarding to ArcSight working:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;D:\splunk\etc\system\local\props.conf  (add the following at the end)&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;#we have 2 separate syslog inputs we'd like to forward&lt;/P&gt;

&lt;P&gt;[source::udp:510]&lt;BR /&gt;
TRANSFORMS-fwd2syslogout = syslogout&lt;/P&gt;

&lt;P&gt;[source::udp:512]&lt;BR /&gt;
TRANSFORMS-fwd2syslogout = syslogout&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;D:\splunk\etc\system\local\outputs.conf  (add the following at the end)&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;# note: use the actual arcsight collector host/port below&lt;/P&gt;

&lt;P&gt;[syslog:udpserver]&lt;/P&gt;

&lt;P&gt;server = ARCSIGHT_CONNECTOR_HOST:ARCSIGHT_COLLECTOR_UDP_PORT&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;D:\splunk\etc\system\default\transforms.conf  (add the following at the end)&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;# forward syslogs to ArcSight&lt;/P&gt;

&lt;P&gt;[syslogout]&lt;/P&gt;

&lt;P&gt;REGEX = .&lt;/P&gt;

&lt;P&gt;DEST_KEY = _SYSLOG_ROUTING&lt;/P&gt;

&lt;P&gt;FORMAT = udpserver&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;With all the above in place, the syslog forwarding (along with local indexing) appears to work&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:31:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148279#M2046</guid>
      <dc:creator>jojoridge</dc:creator>
      <dc:date>2020-09-28T16:31:02Z</dc:date>
    </item>
    <item>
      <title>Re: Using Splunk indexer as a syslog forwarder</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148280#M2047</link>
      <description>&lt;P&gt;You can always put syslog-ng on the indexer. Have syslog-ng listen on 514 instead of splunk, write the files to a temporary directory and have splunk read those instead of listening on 514 itself. This gives you additional resiliency, as any time you restart splunk, data sent via syslog to 514 is lost. With syslog-ng, the data is still written to the disk while Splunk is restarting, and it will pick up where it left off.&lt;/P&gt;</description>
      <pubDate>Thu, 01 May 2014 20:59:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Using-Splunk-indexer-as-a-syslog-forwarder/m-p/148280#M2047</guid>
      <dc:creator>mcmaster</dc:creator>
      <dc:date>2014-05-01T20:59:20Z</dc:date>
    </item>
  </channel>
</rss>

