All Apps and Add-ons
Highlighted

Cisco Networks Add-on for Splunk Enterprise: How can I Use a nonstandard sourcetype to parse Cisco IOS logs?

Explorer

Hello,
I try to use the cisco ios ta to parsing my ios logs.
I have created non standard sourcetype for my logs as follow :

[udp://XXX.XX.XX:514]
source = My-switch-name
sourcetype = network:cisco_switch
disabled = false
index = Network

and

[udp://XXX.XXX.XXX.XXX:514]
source = My-wlc-ap
sourcetype = network:cisco_wlc
disabled = false
index = Network

in the app, i have changed my eventtypes.conf as follow

[cisco_ios]

search = sourcetype=cisco:ios

search = sourcetype=network:*

but the logs are not parsed.

I'm new to Splunk and I have maybe forgotten something ?

Thanks for you help and sorry for my English 😄

0 Karma
Highlighted

Re: Cisco Networks Add-on for Splunk Enterprise: How can I Use a nonstandard sourcetype to parse Cisco IOS logs?

Champion

eventtypes don't parse your data., props and transforms do. If you are creating a custom sourcetype for field extraction purposes you need to create the extractions in props.conf and transforms.conf.

0 Karma
Highlighted

Re: Cisco Networks Add-on for Splunk Enterprise: How can I Use a nonstandard sourcetype to parse Cisco IOS logs?

Explorer

thank you fir your answer.
With your help i have now a working app.

i have changed in props.conf of the TA-cisco_ios following line :

[cisco:ios]

[(?::){0}network:cisco_*]
...
nothing in the transforms.conf

and in the ciscoios i have created a local/eventtypes.conf with theses lines :
[cisco
ios]
search = (sourcetype=network:ciscoswitch OR sourcetype=network:ciscowlc OR sourcetype=network:ciscocoeurreseau)

Thanks again

0 Karma