Splunk Dev

logs are going to catch all index

hemantwcp7
Loves-to-Learn Lots

We have configured the panorama management logs on syslog server correctly. While checking the pan logs on core search head logs are going to catch all index. Please suggest here for correct configuration to fix the issue.

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

The catch-all index is used when the input does not specify an index.  Double-check indexes.conf on the syslog server and make sure every monitor stanza has a index= setting.

---
If this reply helps you, Karma would be appreciated.
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Or if they are supposed to go to a non-existant index (for example, specified when supplying event via HEC) if I remember correctly.

0 Karma

hemantwcp7
Loves-to-Learn Lots

@richgalloway , I checked the available indexes.conf but i did not found  monitor stanza section. Can you please specify the file location on linux OS ?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Not specifically.  The files will be in directories under $SPLUNK_HOME/etc.  Use btool or the Linux find command to locate them (yes, it's most likely there will be more than one).

splunk btool --debug inputs list
find $SPLUNK_HOME/etc -name inputs.conf
---
If this reply helps you, Karma would be appreciated.
0 Karma

hemantwcp7
Loves-to-Learn Lots

@richgalloway, On syslog server we have custom .conf file in syslog-ng directory where all palo alto logs coming on udp_port(10527) , tcp_port(10527) . In this file only i added the new pan source. Rest all pan sources from this conf are correctly landing to proper index on Splunk cloud except one new pan source.

 

 

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Are you using any kind of an intermediate syslog layer? (This syslog-ng you're speaking of)

Does it change/manipulate the events in any way? (For example I have in one of my environments heavily complicated rsyslog-based solution that in the end supplies events to splunk via HEC).

richgalloway
SplunkTrust
SplunkTrust

If you're using a UF to get the data from the syslog server to Splunk then .conf file should be somewhere in /opt/splunkforwarder/etc/ rather than in a syslog-ng directory.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...