I need to change a bit of my Splunk architecture and split the data output as follows:
The first one is easy to do, but the problem is with the second one. My server receives events which are on multiple lines (e.g. Windows Event Logs) and I need to forward them to a syslog server as single line events as a cheaper backup.
How do I get the logs to forward "blindly" to one Splunk server while parsing them into one line and forwarding them to another non-splunk server?
I think your approach is only going to work with Syslog events and the extra effort of having to sylog-ize your remaining ones is probably going to be huge.
There is a way to do this. There is a way that the original message can be copied, transform applied, and sent out to the syslog server. This way the original log in WEF format is indexed in its original state and the syslog server receives tab delim single line format. I've seen it in use, I just don't have the code.
Thanks @CletisSWRX , but this was almost 4 years ago - I no longer use Splunk - I use CyberEasy now.