Getting Data In

Changing host for syslog

a212830
Champion

Hi,

I have syslog messages coming in from thousands of servers, and I'm using splunk to index those messages. The messages are duplicated across 3 regional servers. I need the ability to show the forwarder that processed the event. How do I do that, since I change the hostname to be the network device?

Tags (3)
0 Karma
1 Solution

sbrant_splunk
Splunk Employee
Splunk Employee

You can utilize props and transforms to grab the host metadata, before it is changed and assign it to a new field. Here is an example:

# -- props.conf
[sourcetype]
TRANSFORMS-fwd_host = forwarder_host

# -- transforms.conf
[forwarder_host]
SOURCE_KEY = MetaData:Host
REGEX = host::(.*)
DEST_KEY = _meta
FORMAT = forwarder::$1

View solution in original post

0 Karma

sbrant_splunk
Splunk Employee
Splunk Employee

You can utilize props and transforms to grab the host metadata, before it is changed and assign it to a new field. Here is an example:

# -- props.conf
[sourcetype]
TRANSFORMS-fwd_host = forwarder_host

# -- transforms.conf
[forwarder_host]
SOURCE_KEY = MetaData:Host
REGEX = host::(.*)
DEST_KEY = _meta
FORMAT = forwarder::$1
0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...