Getting Data In

Multiple Source types from one host

godzilla74
New Member

Hi All,

New to Splunk> and trying to wrap my head around things... I have a host (it's a Linux Firewall/IDS) that is transmitting all syslog data to my Splunk server. I'm really only concerned about the iptables drops and snort alerts.

I've entered the following in inputs.conf:

[udp://192.168.1.1:514]
sourcetype = snort

[udp://192.168.2.1:514]
sourcetype = snort

*not sure if this is correct...

In my reading of the Splunk docs, it seems that I now need to do something with props.conf so that I can parse the incoming syslog data for snort and iptables logs.

Am I right or totally off? Any help would be great!

Thanks!
Justin

0 Karma

lukejadamec
Super Champion

If your logs are getting indexed and the fields are properly parsed with that config then you have done good so far.

If you want to now drop all but the iptables, drops, and alerts, then you will need to configure props.conf and transforms.conf to save only those events you want to keep. If you decide to drop data at index time then understand that the data will be lost, and will need to be reindexed if you find you need it in Splunk assuming it is also getting stored elsewhere.

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...