<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic syslog indexing in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/syslog-indexing/m-p/413126#M73079</link>
    <description>&lt;P&gt;However at this point I am getting logs from syslog data source and they are saved at /central/$hostname$/gateway.log&lt;BR /&gt;
I install the UF on syslog server and below is my inputs.conf file.&lt;/P&gt;

&lt;P&gt;[root@sysxx ~]# cat /opt/splunkforwarder/etc/system/local/inputs.conf&lt;/P&gt;

&lt;P&gt;[default]&lt;/P&gt;

&lt;P&gt;[monitor:///cental/gateway/]&lt;BR /&gt;
index = sophos&lt;BR /&gt;
sourcetype = sophos:utm:firewall&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;P&gt;All my logs are going to main index. &lt;BR /&gt;
If I move index and sourcetype parameter above to [monitor:///cental/gateway/] then I can see the logs under index=sophos.&lt;/P&gt;

&lt;P&gt;how can I solve this.&lt;/P&gt;

&lt;P&gt;in future I will have logs from more data sources and I want to index them under different index name.&lt;/P&gt;</description>
    <pubDate>Mon, 21 May 2018 08:13:36 GMT</pubDate>
    <dc:creator>riqbal</dc:creator>
    <dc:date>2018-05-21T08:13:36Z</dc:date>
    <item>
      <title>syslog indexing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/syslog-indexing/m-p/413126#M73079</link>
      <description>&lt;P&gt;However at this point I am getting logs from syslog data source and they are saved at /central/$hostname$/gateway.log&lt;BR /&gt;
I install the UF on syslog server and below is my inputs.conf file.&lt;/P&gt;

&lt;P&gt;[root@sysxx ~]# cat /opt/splunkforwarder/etc/system/local/inputs.conf&lt;/P&gt;

&lt;P&gt;[default]&lt;/P&gt;

&lt;P&gt;[monitor:///cental/gateway/]&lt;BR /&gt;
index = sophos&lt;BR /&gt;
sourcetype = sophos:utm:firewall&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;P&gt;All my logs are going to main index. &lt;BR /&gt;
If I move index and sourcetype parameter above to [monitor:///cental/gateway/] then I can see the logs under index=sophos.&lt;/P&gt;

&lt;P&gt;how can I solve this.&lt;/P&gt;

&lt;P&gt;in future I will have logs from more data sources and I want to index them under different index name.&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 08:13:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/syslog-indexing/m-p/413126#M73079</guid>
      <dc:creator>riqbal</dc:creator>
      <dc:date>2018-05-21T08:13:36Z</dc:date>
    </item>
    <item>
      <title>Re: syslog indexing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/syslog-indexing/m-p/413127#M73080</link>
      <description>&lt;P&gt;I did not understand your question. If you put &lt;CODE&gt;index = sophos sourcetype = sophos:utm:firewall&lt;/CODE&gt; data will go to &lt;CODE&gt;sophos&lt;/CODE&gt; otherwise it will go to default index called &lt;CODE&gt;main&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 09:46:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/syslog-indexing/m-p/413127#M73080</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2018-05-21T09:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: syslog indexing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/syslog-indexing/m-p/413128#M73081</link>
      <description>&lt;P&gt;let me explain in more detail:&lt;BR /&gt;
1- I have one syslog server where all the network devices sending logs and that logs are saving at&lt;BR /&gt;
/central/$hostname$/$hostname$.log&lt;BR /&gt;
2- I install UF on that syslog server and configure it to send logs to HF.&lt;BR /&gt;
3- with this config(as shown above), all logs are going to main index.&lt;/P&gt;

&lt;P&gt;Interestingly, when I define index on top(&lt;STRONG&gt;before [monitor:///cental/gateway/]),&lt;/STRONG&gt; the logs are getting saved in index=Sophos.&lt;/P&gt;

&lt;P&gt;=========================================&lt;/P&gt;

&lt;P&gt;I just experiment this on my workstation. my workstation is also sending logs to splunk.&lt;BR /&gt;
below is my input.conf file.&lt;/P&gt;

&lt;P&gt;[WinEventLog://Microsoft-Windows-Sysmon/Operational]&lt;BR /&gt;
index = os_xx1&lt;BR /&gt;
disabled = 0 &lt;/P&gt;

&lt;P&gt;with that, the logs are not getting saved in index = os_xx1.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;BUT WHEN I CHAGNE props.conf and transforms.conf, the logs are going to right index.&lt;/STRONG&gt; &lt;BR /&gt;
below is props.conf and transforms.conf:&lt;BR /&gt;
&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;BR /&gt;
[WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-Windows = windows_security&lt;/P&gt;

&lt;P&gt;[WinEventLog://Microsoft-Windows-Sysmon/Operational]&lt;/P&gt;

&lt;H1&gt;TRANSFORMS-Windows = windows_sysmon&lt;/H1&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;BR /&gt;
[windows_security]&lt;BR /&gt;
 REGEX = (.*)&lt;BR /&gt;
 FORMAT = os_xx1&lt;BR /&gt;
 WRITE_META = true&lt;/P&gt;

&lt;P&gt;[windows_sysmon]&lt;BR /&gt;
 REGEX = (.*)&lt;BR /&gt;
 FORMAT = os_xx1&lt;BR /&gt;
 WRITE_META = true&lt;/P&gt;

&lt;P&gt;========================================================&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 19:39:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/syslog-indexing/m-p/413128#M73081</guid>
      <dc:creator>riqbal</dc:creator>
      <dc:date>2020-09-29T19:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: syslog indexing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/syslog-indexing/m-p/413129#M73082</link>
      <description>&lt;P&gt;referring "&lt;A href="https://answers.splunk.com/answers/468907/is-it-possible-to-have-separate-indexes-within-a-s.html"&gt;https://answers.splunk.com/answers/468907/is-it-possible-to-have-separate-indexes-within-a-s.html&lt;/A&gt;" &lt;BR /&gt;
I think i am not referring correct REGEX value.&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 12:51:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/syslog-indexing/m-p/413129#M73082</guid>
      <dc:creator>riqbal</dc:creator>
      <dc:date>2018-05-21T12:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: syslog indexing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/syslog-indexing/m-p/413130#M73083</link>
      <description>&lt;P&gt;Hi riqbal, I think part of the issue might be related to some additional config you aren't aware of. Try running btool to get an view of all the inputs config. A usage example is:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;/opt/splunk/bin/splunk btool --debug inputs list
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This will give you a rolled up view of all inputs config.&lt;/P&gt;

&lt;P&gt;Additionally, you can look at inputs config from Splunk with this app I made for this purpose : &lt;A href="https://splunkbase.splunk.com/app/3923/"&gt;https://splunkbase.splunk.com/app/3923/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Although it seems less likely, there could also be some props.conf config causing issues (rewriting the index config), but I think doing a thorough examination of the inputs config at each step will be the most helpful thing to do.&lt;/P&gt;

&lt;P&gt;Please let me know if this helps!&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 14:14:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/syslog-indexing/m-p/413130#M73083</guid>
      <dc:creator>muebel</dc:creator>
      <dc:date>2018-05-21T14:14:23Z</dc:date>
    </item>
  </channel>
</rss>

