<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Breaking up syslog sourcetype in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296839#M3769</link>
    <description>&lt;P&gt;I do not see any flaws in your configuration.had you perform splunkd restart after editing the configuration?&lt;/P&gt;</description>
    <pubDate>Sat, 06 Jan 2018 05:13:39 GMT</pubDate>
    <dc:creator>mayurr98</dc:creator>
    <dc:date>2018-01-06T05:13:39Z</dc:date>
    <item>
      <title>Breaking up syslog sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296836#M3766</link>
      <description>&lt;P&gt;Good afternoon,&lt;BR /&gt;
I am working on trying to divide my network  devices up so that I have different sourcetypes for each vendor, and then ultimately ship them off to different indexes as well.  These devices all things like routers and switches, so I need to use their builtin syslog services.  Unfortunately, I'm not understanding the documentation properly and it is not working.&lt;/P&gt;

&lt;P&gt;I'm focusing on Nokia gear for the time being, here is a sanitized example log entry from a Nokia device:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Jan  5 13:27:51 123.123.123.123 TMNX: 803766 Base BGP-WARNING-bgpBackwardTransition-2002 [Peer 1: 123.123.123.123]:  VR 1: Group mpBGP-IPv4: Peer 123.123.123.123: moved from higher state OPENSENT to lower state IDLE due to event TCP SOCKET ERROR
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Here's the stanza from my transforms.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[nokia]
REGEX = TMNX
FORMAT = sourcetype::nokia
DEST_KEY = MetaData:Sourcetype
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And here's from props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::udp:514]
TRANSFORMS-nokia = nokia
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I am getting data in, but it's all just showing up under the sourcetype of syslog.  Thanks in advance for your help.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 21:35:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296836#M3766</guid>
      <dc:creator>dramage</dc:creator>
      <dc:date>2018-01-05T21:35:26Z</dc:date>
    </item>
    <item>
      <title>Re: Breaking up syslog sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296837#M3767</link>
      <description>&lt;P&gt;Are you sending data directly to Splunk via UDP port monitoring in Splunk OR using syslog-ng (or similar) tool to receive data and having Splunk monitor the written log files? Based on configuration you've put it, I'm guessing it's the former, so where does these conf file setting exist (which Splunk server), Heavy Forwarder/Universal Forwarder or Indexer? Did you restart Splunk after adding those configuration entry.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 22:31:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296837#M3767</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2018-01-05T22:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: Breaking up syslog sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296838#M3768</link>
      <description>&lt;P&gt;You are correct, we are simply sending data directly to Splunk over UDP.&lt;BR /&gt;
We don't yet have enough traffic to need multiple Splunk servers, so everything is running on one system.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 22:47:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296838#M3768</guid>
      <dc:creator>dramage</dc:creator>
      <dc:date>2018-01-05T22:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: Breaking up syslog sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296839#M3769</link>
      <description>&lt;P&gt;I do not see any flaws in your configuration.had you perform splunkd restart after editing the configuration?&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jan 2018 05:13:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296839#M3769</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2018-01-06T05:13:39Z</dc:date>
    </item>
    <item>
      <title>Re: Breaking up syslog sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296840#M3770</link>
      <description>&lt;P&gt;Could you please check your inputs.conf, where you have mentioned your TCP/UDP method to collect data. Make sure you have defined &lt;BR /&gt;
sourcetype = nokia &lt;BR /&gt;
for your monitored data.&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jan 2018 08:22:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296840#M3770</guid>
      <dc:creator>risgupta</dc:creator>
      <dc:date>2018-01-07T08:22:13Z</dc:date>
    </item>
    <item>
      <title>Re: Breaking up syslog sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296841#M3771</link>
      <description>&lt;P&gt;Hi there @dramage&lt;/P&gt;

&lt;P&gt;Please, try like this.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[syslog]
TRANSFORMS-syslog_to_nokia_sourcetype = renaming_to_nokia
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[renaming_to_nokia]
REGEX = TMNX
FORMAT = sourcetype::nokia
DEST_KEY = MetaData:Sourcetype
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope it helps.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 14:11:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Breaking-up-syslog-sourcetype/m-p/296841#M3771</guid>
      <dc:creator>alemarzu</dc:creator>
      <dc:date>2018-01-08T14:11:33Z</dc:date>
    </item>
  </channel>
</rss>

