Splunk Cloud Platform

Forwarding ID

DaveBunn
Path Finder

Is there a way to find which forwarder a devices event logs came from.
I have hundreds of devices sending WEC logs through WEC servers, I could really do with an easy method to pinpoint where they came from during search time.

Something like
Index=wec_index
| ctable hosts,  WECSvr

Labels (1)
0 Karma
1 Solution

Roy_9
Motivator

Hello,

You could use the below search and also you can track it in cloud monitoring console.

index=_internal sourcetype=splunkd group=tcpin_connections | stats first(version) by hostname

 

 

Thanks 

View solution in original post

DaveBunn
Path Finder

Thanks Roy99 - worked perfectly - easy when you know how.

0 Karma

Roy_9
Motivator

Hello,

You could use the below search and also you can track it in cloud monitoring console.

index=_internal sourcetype=splunkd group=tcpin_connections | stats first(version) by hostname

 

 

Thanks 

Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...