Getting Data In

splitting data coming from Universal forwarder to external syslog

ssyed2009
New Member

We are forwarding data coming from our universal forwarders to an external Syslog server.

Our current Dataflow Architecture

Universal Forwarder -> Regional Heavy Forwarder -> Final Heavy forwarder -> Indexer

the data is received from the universal forwarder and an output sends the data to Regional Heavy Forwarder. There is another output that sends the data to the final Heavy forwarder. Once the data gets to the final heavy forwarder we have outputs that output data to indexer and duplicate stream to external Syslog.

ISSUE
The event count in the external Syslog server from the duplicate stream is almost half than the data that was indexed by Splunk. So from Splunk to our external Syslog server, we are dropping events.

ASK
I would like to know if there is a tstat command or something is Splunk that would give some metrics of how much data is being sent to the external source from a particular outputs.conf.

To send data to external syslog we are using the below solution

props.conf
[sourcetype]
TRANSFORMS-sample = sample_syslog_trend

transforms.conf
[sample_syslog_trend]
REGEX = .
DEST_KEY = _SYSLOG_ROUTING
FORMAT = sample_syslog

outputs.conf
[syslog:sample_syslog]
server = hostname/ipaddress:514
sendCookedData = false

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...