Getting Data In

what should I do if the Indexers don't receive logs for a syslog server-based log file, for more than 5 minutes

abhishekdubey00
Engager

Syslog Server Source Feed Check' was triggered. It is raised when the Indexers don't receive logs for a syslog server-based log file, for more than 5 minutes

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

First, is it normal for that log file to be quiet for 5 minutes? If so, change the alert interval.
If this is an abnormal condition, you need to find the cause. Verify the forwarder on the syslog server is still running and in communication with your indexers. Verify the syslog process is still running. Verify the source is still sending events to the syslog server.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

First, is it normal for that log file to be quiet for 5 minutes? If so, change the alert interval.
If this is an abnormal condition, you need to find the cause. Verify the forwarder on the syslog server is still running and in communication with your indexers. Verify the syslog process is still running. Verify the source is still sending events to the syslog server.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...