Conventional wisdom for collecting syslog data from external sources (network equipment, etc) was to put a couple of dedicated syslog-ng servers behind a load balancer, write the logs to a file, and have Splunk monitor the files. With Splunk 4.2 and the Universal Forwarders, does this still hold true?
We want to add some resiliency in our log collection... in most cases we can use the Splunk Universal Forwarder, but in cases where we can't, we rely on syslog. I was considering deploying a couple of dedicated VMs running Splunk Universal Forwarders behind a load balancer to grab the syslog data from this equipment. I am considering:
What are the pros & cons of each approach? My gut tells me that with the proper monitoring and load balancing, the Splunk Universal Forwarder could handle this job by itself.
Thanks.
Yes, writing to files (split out by host, with at least one rotated file) is still the recommendation, and the reasons have not changed between 4.1 and 4.2. Three reasons are:
Hello
I have a request to have a SYSLOG server and a SPLUNK server. The request is to have the logs from external sources written to the SYSLOG server then forwarded and read by the SPLUNK server.
I am using MS Server 2012 R2 for both, SPLUNK Enterprise 7
How would I:
Have logs from different sources (Cisco, Microsoft, Linux) written to a SYSLOG Server.
Forward the log to a SPLUNK server
Thanks
Yes, writing to files (split out by host, with at least one rotated file) is still the recommendation, and the reasons have not changed between 4.1 and 4.2. Three reasons are:
I don't see a reason why "Splunk team" cannot implement such a "performant, reliable and flexible" syslog entry point internally so that we don't need that extra stuff in front of it. It's the strenghts of Splunk of being so performant, so why not make a good UDP / syslog compatible entry point for it?
The syslog client implementations can also cache and buffer stuff in case of small network disruptions already.
Papertrail for example can also handle syslog events directly without any problem.
Is this still the best practice today with Splunk 7
As a beginner here, I have to ask about that statement on flexibility: can you give an example of such processing? Or, put in a different way, what is it you can't do, if you go with Splunk UF instead?