Getting Data In

Populating Syslog Data from Cisco WLC into a Specific Index

fdharmawan
New Member

Hi Guys,

May I know how to make syslog data from a specific IP (in this case Cisco WLC) to be inserted into a specific index? I already forwarded the syslog into Splunk, but somehow it falls into the wrong index. From the WLC side, unfortunately it cannot specify the syslog port. I did created the index and forward the syslog from WLC to Splunk. But not sure how to connect the data into the index. Thank you.

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @fdharmawan,
you have to insert in your Indexers and (if present) Heavy Forwarders, the following files:

In $SPLUNK_HOME/etc/system/local/transforms.conf

[overrideindex]
DEST_KEY =_MetaData:Index
REGEX = .
FORMAT = my_new_index

In $SPLUNK_HOME/etc/system/local/props.conf

[host::your_ip_address]
TRANSFORMS-index = overrideindex

In addition I hint, you could create a dedicated app and insert these props.conf and transforms.conf in it: $SPLUNK_HOME/etc/apps/your_app/local

Ciao.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...