All Apps and Add-ons

apache_logs reporting no source

crogersnlagovau
New Member

Hi,

I've set up a central forwarder to send all our apache logs to the indexes. Here is one of the monitor sections:

[monitor:///weblogs/catalogue/]
sourcetype = access_combined
whitelist=access_log.*[0-9].gz
index = apache_blah
host = apacheblah.com
ignoreOlderThan = 31d
recursive = true

However, I'm seeing this error in splunkd.log on the forwarder:

WARN  TcpOutputProc - The event is missing source information. Event :

When I look at the source field, it is reporting the log filename. This is affecting me using Traffic Ray because the host information is using the source field.

How can I get the source section saying apache_blah.com or catalogue?

Regards

0 Karma

alacercogitatus
SplunkTrust
SplunkTrust

Typically, you don't want to consume GZ files, as they contain LARGE amounts of data and is not RealTime. I'd suggest consuming the access_log in the raw form first, it will be continually monitored and you won't have to worry about GZ rotations.

As for the Traffic Ray App, the way the data input is crafted is not a Best Practice. However, you should be able to fix it by REMOVING the REGEX on a path for the host field. This way, your input will use the specified apacheblah.com setting, and not something from the path.

woodcock
Esteemed Legend

It seems OK to me but give this alternate syntax a try:

[monitor:///weblogs/catalogue/.../access_log.*[0-9].gz]
sourcetype = access_combined
index = apache_blah
host = apacheblah.com
ignoreOlderThan = 31d
recursive = true
0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...