We have installed the add-on available on Splunkbase for F5 BIG-IP LTM, but some events are not being properly mapped to their corresponding event information. Additionally, the default sourcetype being used is syslog. we installed this add on on SH and HF respectively. Events also shows event type = f5_bigip_syslog_audit_process
sample events contains below messages
obj_delete
create_if
modify
monitor status up
monitor status down
Anyone face this issue or find something helpful to improve or make some changes on add on
Just to check, is it the 'Splunk Add-on for F5 BIG-IP' app you have installed?
The docs for the app (https://splunk.github.io/splunk-add-on-for-f5-big-ip/Prepare_F5_Servers_For_Telemetry/) provide details on how best to set up the data ingestion. If you are using syslog approach then the recommendation is to use Splunk Connect for Syslog (SC4S) however if you are using native syslog into Splunk then you need to set the sourcetype to f5:bigip:syslog.
More info on syslog ingestion is available at https://splunk.github.io/splunk-add-on-for-f5-big-ip/Obtain_Syslog_Data/
Once the sourcetype is defined correctly the app should hopefully provide the appropriate field extractions etc.
🌟 Did this answer help you? If so, please consider:
Your feedback encourages the volunteers in this community to continue contributing