<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Forward syslog to third part based on field extraction in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Forward-syslog-to-third-part-based-on-field-extraction/m-p/36882#M6802</link>
    <description>&lt;P&gt;I'm evaluating Splunk for our syslog needs. One of our final requirements is to have the ability to forward syslog messages to another system. Specifically, we need to forward messages based on the source host, severity level, or event code.&lt;BR /&gt;
I've already checked out the article on &lt;A href="http://docs.splunk.com/Documentation/Splunk/5.0.2/Deploy/Forwarddatatothird-partysystemsd#Syslog_data" target="_blank"&gt;sending a subset of data to a syslog server&lt;/A&gt;. In the example they show how you can apply forwarding to a host in props.conf. I'd like to know how I can do this based on field extractions. For instance, I'd like to forward all messages of a severity critical or greater to my other syslog server. I can do this by defining the REGEX in transforms.conf (see below for example), but this can get kind of sloppy. I already have the field extractions defined for the sourcetypes. I just don't know how to go about using them in this scenario.&lt;/P&gt;

&lt;P&gt;props.conf&lt;BR /&gt;
[source::udp:514]&lt;BR /&gt;
TRANSFORMS-syslog_forwarder = send_to_syslog&lt;/P&gt;

&lt;P&gt;transforms.conf&lt;BR /&gt;
[send_to_syslog]&lt;BR /&gt;
REGEX = %\w+-[012]-\w+ &lt;BR /&gt;
DEST_KEY = _SYSLOG_ROUTING&lt;BR /&gt;
FORMAT = my_syslog_group&lt;/P&gt;

&lt;P&gt;outputs.conf&lt;BR /&gt;
[syslog:my_syslog_group]&lt;BR /&gt;
server = 192.168.100.100:514&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 13:55:21 GMT</pubDate>
    <dc:creator>rjordan00</dc:creator>
    <dc:date>2020-09-28T13:55:21Z</dc:date>
    <item>
      <title>Forward syslog to third part based on field extraction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-syslog-to-third-part-based-on-field-extraction/m-p/36882#M6802</link>
      <description>&lt;P&gt;I'm evaluating Splunk for our syslog needs. One of our final requirements is to have the ability to forward syslog messages to another system. Specifically, we need to forward messages based on the source host, severity level, or event code.&lt;BR /&gt;
I've already checked out the article on &lt;A href="http://docs.splunk.com/Documentation/Splunk/5.0.2/Deploy/Forwarddatatothird-partysystemsd#Syslog_data" target="_blank"&gt;sending a subset of data to a syslog server&lt;/A&gt;. In the example they show how you can apply forwarding to a host in props.conf. I'd like to know how I can do this based on field extractions. For instance, I'd like to forward all messages of a severity critical or greater to my other syslog server. I can do this by defining the REGEX in transforms.conf (see below for example), but this can get kind of sloppy. I already have the field extractions defined for the sourcetypes. I just don't know how to go about using them in this scenario.&lt;/P&gt;

&lt;P&gt;props.conf&lt;BR /&gt;
[source::udp:514]&lt;BR /&gt;
TRANSFORMS-syslog_forwarder = send_to_syslog&lt;/P&gt;

&lt;P&gt;transforms.conf&lt;BR /&gt;
[send_to_syslog]&lt;BR /&gt;
REGEX = %\w+-[012]-\w+ &lt;BR /&gt;
DEST_KEY = _SYSLOG_ROUTING&lt;BR /&gt;
FORMAT = my_syslog_group&lt;/P&gt;

&lt;P&gt;outputs.conf&lt;BR /&gt;
[syslog:my_syslog_group]&lt;BR /&gt;
server = 192.168.100.100:514&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:55:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-syslog-to-third-part-based-on-field-extraction/m-p/36882#M6802</guid>
      <dc:creator>rjordan00</dc:creator>
      <dc:date>2020-09-28T13:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: Forward syslog to third part based on field extraction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-syslog-to-third-part-based-on-field-extraction/m-p/36883#M6803</link>
      <description>&lt;P&gt;Not sure how you imagine this would work? Field extractions take place at search-time, not index-time, so these are kind of two different things you're talking about.&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2013 18:19:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-syslog-to-third-part-based-on-field-extraction/m-p/36883#M6803</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-05-16T18:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: Forward syslog to third part based on field extraction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-syslog-to-third-part-based-on-field-extraction/m-p/36884#M6804</link>
      <description>&lt;P&gt;You're limited to using the REGEX syntax as a qualifier if you want to transform the data. You can't use field extractions as a qualifier for this type of configuration. &lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2013 19:04:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-syslog-to-third-part-based-on-field-extraction/m-p/36884#M6804</guid>
      <dc:creator>jbsplunk</dc:creator>
      <dc:date>2013-05-16T19:04:21Z</dc:date>
    </item>
    <item>
      <title>Re: Forward syslog to third part based on field extraction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-syslog-to-third-part-based-on-field-extraction/m-p/36885#M6805</link>
      <description>&lt;P&gt;Thanks for the answer. On a related note, can I define multiple transforms so I can have different REGEX for different types of events I want to forward? For example, if I want to forward severity critical and higher and also a specific type of Cisco ASA event. &lt;/P&gt;

&lt;P&gt;props.conf&lt;BR /&gt;
[source::udp:514]&lt;BR /&gt;
TRANSFORMS-syslog_forwarder = syslog_severity, syslog_event&lt;/P&gt;

&lt;P&gt;transforms.conf&lt;BR /&gt;
[syslog_severity]&lt;BR /&gt;
REGEX = %\w+-[123]-\w+&lt;BR /&gt;
DEST_KEY = _SYSLOG_ROUTING&lt;BR /&gt;
FORMAT = my_syslog_group&lt;/P&gt;

&lt;P&gt;[syslog_event]&lt;BR /&gt;
REGEX = %ASA-5-713904&lt;BR /&gt;
DEST_KEY = _SYSLOG_ROUTING&lt;BR /&gt;
FORMAT = my_syslog_group&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:55:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-syslog-to-third-part-based-on-field-extraction/m-p/36885#M6805</guid>
      <dc:creator>rjordan00</dc:creator>
      <dc:date>2020-09-28T13:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: Forward syslog to third part based on field extraction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Forward-syslog-to-third-part-based-on-field-extraction/m-p/36886#M6806</link>
      <description>&lt;P&gt;Sure, you could do that and it would work, or you could also combine them into a single regex and have one transform for 'syslog'. I suppose if you're going to do a lot of stuff with third party forwarding it might be cleaner to use separate transforms, but either approach would work.&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;P&gt;[source::udp:514] &lt;BR /&gt;
TRANSFORMS-syslog_forwarder = syslog&lt;/P&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;P&gt;[syslog]&lt;BR /&gt;
REGEX = (THIS|THAT|OTHER)&lt;BR /&gt;
DEST_KEY = _SYSLOG_ROUTING&lt;BR /&gt;
FORMAT = my_syslog_group&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:55:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Forward-syslog-to-third-part-based-on-field-extraction/m-p/36886#M6806</guid>
      <dc:creator>jbsplunk</dc:creator>
      <dc:date>2020-09-28T13:55:27Z</dc:date>
    </item>
  </channel>
</rss>

