I want to ingest syslog from different devices like ESXI Hosts, firewalls (fortigate, palo alto), switches can somebody answer how can I achieve this? I was thinking if I can forward syslog to HF and then to indexers but not aware of the full process. Please let me know if there are any other methods as well.
Hi @maheshnc ,
I usually use rsyslog on a Universal or Heavy Forwarder to receive syslogs also when Splunk is down on this machine.
The best solution is to have two (or more) machines with rsyslog receiver and a Load Balancer in front of them, so you have also HA features in your architecture and you can receive logs even if one of the receivers is down.
Then files written by rsyslog can be read by Splunk Forwarder and sent to Indexers.
In the rsyslog, you can also configure host and technology recognition.
Ciao.
Giuseppe
There are a few ways to onboard data into Splunk.
Is it possible to configure the syslog device to send data to HF and then forward it to the indexers?
@maheshnc Yes that is possible , you can configure the syslog device to send data to HF and then forward it to the indexers.
Could you please through some light on process and configurations to be done, as I have not onboarded it before.
Hi @maheshnc ,
the process is linear:
to have more information about rsyslog configuration, you can read at https://www.rsyslog.com/doc/index.html
Ciao.
Giuseppe
With a fairly modern rsyslog you can send directly to HEC input bypassing the need to create local files.
You can enable a tcp or udp source on a Splunk component. But. The other ways of handling syslogs are usually better - more robust, easier to maintain, less downtime needed for maintenance and so on.