Bear with me as this is the first time im doing this.
I configured a vmware host to send its events via syslog to splunk. It is working. Raw logs are stored in /opt/syslog/192.168.x.x in four different types (local, daemon logs etc)
Now, how do I index these logs? How do I create a new index=vmware which will start index raw logs and I can start searching?
Googled a bit but I cant find a step-by-step tutorial
Hi @dritjon,
let me understand: you configured a syslog-ng or anotehr kind of syslog server that writes the received logs in files of the above folder, is it correct?
The second question is: syslog server in on the same server where Splunk is installed or in a different one?
If in the same server you have to:
if in different servers, you have to:
Ciao.
Giuseppe