Getting Data In

Best Practice - Multiple source types

ski98033
Explorer

Hi,

What is the best practice when looking at syslogs:

  1. Split the syslog into multiple files, one for each source type (e.g. mail, syslog, apache, etc.) and then apply one source type to each file.
  2. Read in the syslog and then have the indexer apply the source type based upon entries in the transforms and props files.

What are the pluses and minutes of each option.

cheers,

ski

Tags (1)
0 Karma

kristian_kolb
Ultra Champion

Hi,

I would say that if you can be bothered to configure your syslog-server to split incoming data into separate files you'd be a lot better off. Since the syslog daemon is aware of the originating IP/hostname as well as facility, you can build a directory structure like /var/log/my_syslog/<hostname>/<ip-address>.log or something similar.

This is more certain than relying on Splunk being able to parse out the hostname from each event, which is default splunk behaviour for the syslog sourcetype. This will work in almost all cases, but I've seen network appliances that log without a space after the hostname, resulting in hosts like

switch01snmpUtil
switch01snmpMgmt
switch01somethingElse

Thus you'll get a new host for each type of message from a single device, which is not so good, and unfortunately hard/impossible to correct on the splunk server.

Hope this helps,

Kristian

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...