<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: UNIX log parsing issue in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653361#M110822</link>
    <description>&lt;P&gt;Smartmode&lt;/P&gt;</description>
    <pubDate>Mon, 07 Aug 2023 06:01:05 GMT</pubDate>
    <dc:creator>pm2012</dc:creator>
    <dc:date>2023-08-07T06:01:05Z</dc:date>
    <item>
      <title>How to fix UNIX log parsing issue?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653348#M110818</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;I could see logs coming from UNIX devices in the below format&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;lt;38&amp;gt;Aug 1 13:20:29 dns.customer.net 10.32.9.5 sshd[14171]: Failed password for michal from 10.32.7.28 port 58255 ssh2&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When i look into the selected events on the left panel these logs are not getting parse, like username, source ip , port, protocol. Any suggestion please. Logs are coming through rsyslog mechanism using TCP input from the device&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2023 19:19:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653348#M110818</guid>
      <dc:creator>pm2012</dc:creator>
      <dc:date>2023-08-07T19:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: UNIX log parsing issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653352#M110819</link>
      <description>&lt;P&gt;&amp;nbsp;You have the&amp;nbsp;&lt;STRONG&gt;Splunk Add-on for Unix and Linux&amp;nbsp;&lt;/STRONG&gt;installed?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2023 05:25:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653352#M110819</guid>
      <dc:creator>jotne</dc:creator>
      <dc:date>2023-08-07T05:25:03Z</dc:date>
    </item>
    <item>
      <title>Re: UNIX log parsing issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653354#M110820</link>
      <description>&lt;P&gt;Yeah it is installed&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2023 05:31:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653354#M110820</guid>
      <dc:creator>pm2012</dc:creator>
      <dc:date>2023-08-07T05:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: UNIX log parsing issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653357#M110821</link>
      <description>&lt;P&gt;You are using &lt;STRONG&gt;Smart Mode&lt;/STRONG&gt; or &lt;STRONG&gt;Verbose Mode&lt;/STRONG&gt;, not &lt;STRONG&gt;Fast Mode&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2023 05:44:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653357#M110821</guid>
      <dc:creator>jotne</dc:creator>
      <dc:date>2023-08-07T05:44:12Z</dc:date>
    </item>
    <item>
      <title>Re: UNIX log parsing issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653361#M110822</link>
      <description>&lt;P&gt;Smartmode&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2023 06:01:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653361#M110822</guid>
      <dc:creator>pm2012</dc:creator>
      <dc:date>2023-08-07T06:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: UNIX log parsing issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653363#M110823</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Can you describe your environment? Single node, distributed environment, OS, have you UF for collection or HF? Is there any HF before your indexers / SH(s)? Where you have installed this TA?&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2023 06:48:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653363#M110823</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2023-08-07T06:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: UNIX log parsing issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653395#M110826</link>
      <description>&lt;P&gt;Based on the tagging of SYSLOG based on the front tag, I would assume that this is being ingested into a syslog server and then sent to an Indexer or Heavy Forwarder. If this is the case, the Splunk Add-on is not going to help you in this situation if this is the case. I usually ingest the data from SYSLOG and then use regex to extract the field names when I am conducting searches.&lt;/P&gt;&lt;P&gt;If this is being monitored on the server that is using a Universal Forwarder, then ensure that you are monitoring the /var/log locations with the splunkbase app on the forwarder and on the indexer.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2023 11:24:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-fix-UNIX-log-parsing-issue/m-p/653395#M110826</guid>
      <dc:creator>Simple_Search</dc:creator>
      <dc:date>2023-08-07T11:24:22Z</dc:date>
    </item>
  </channel>
</rss>

