Getting Data In

Populating Syslog Data from Cisco WLC into a Specific Index

fdharmawan
New Member

Hi Guys,

May I know how to make syslog data from a specific IP (in this case Cisco WLC) to be inserted into a specific index? I already forwarded the syslog into Splunk, but somehow it falls into the wrong index. From the WLC side, unfortunately it cannot specify the syslog port. I did created the index and forward the syslog from WLC to Splunk. But not sure how to connect the data into the index. Thank you.

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @fdharmawan,
you have to insert in your Indexers and (if present) Heavy Forwarders, the following files:

In $SPLUNK_HOME/etc/system/local/transforms.conf

[overrideindex]
DEST_KEY =_MetaData:Index
REGEX = .
FORMAT = my_new_index

In $SPLUNK_HOME/etc/system/local/props.conf

[host::your_ip_address]
TRANSFORMS-index = overrideindex

In addition I hint, you could create a dedicated app and insert these props.conf and transforms.conf in it: $SPLUNK_HOME/etc/apps/your_app/local

Ciao.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...