Splunk Enterprise

Best way to collect syslog into Splunk

davidwaugh
Path Finder

Hello. We have a large number of devices that send syslog to Splunk that we need to ingest. All devices and Splunk is on premis. There are many different type of syslog messages that we need to collect. As an example some of the source types are:

  • web proxy logs
  • firewall logs from different vendors
  • web application logs
  • dhcp logs
  • and many many more...

All devices currently send syslog to the same IP address and UDP port 514.

Currently we manage this by having an rsyslog configration that is shared across servers using a puppet config. This allow us to edit the syslog configuration on one server and have it pushed out to all other servers.

The rsyslog.conf file 

  • identifies the type of syslog being received
  • which file and directory the syslog message should be written to.

The various files are written to disk and then an inputs.conf file is automatically updated to ensure that the file is ingested into Splunk. The file and directory path allows us to determine the index the data is written to and the sourcetype.

This works, but is quite complex. The servers are currently based on centos 6 which is end of life in November.

How do other people collect and manage syslog in their environments? 

Thanks for your help.

 

 

 

Labels (1)
Tags (1)

davidwaugh
Path Finder

Does anyone have any experience of running "Splunk Connect 4 Syslog" SC4S within an enterprise environment?

 

0 Karma

davidwaugh
Path Finder

Looking at the Splunk Connect 4 Syslog (SC4S) Solution.

0 Karma

davidwaugh
Path Finder
0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

As @inventsekar pointed, you should definitely use something else that Splunk’s own TCP/UDP stream receivers. Use some real syslog server, clustered or not it's not so big issues and try to change sources to use at least TCP, TLS or even RELP as sending protocol. Those ensure better that you don't lost events. Also it's mandatory to use correct profiles on LB (e.g. in F5 FastL4 is needed) or otherwise those lost some event.

Mostly used are syslog-ng and rsyslog. 

r. Ismo

0 Karma

inventsekar
SplunkTrust
SplunkTrust

Hi @davidwaugh 
As per my little knowledge on Syslog, many suggested that syslog-ng is the best idea to
consider.. 

https://www.splunk.com/en_us/blog/tips-and-tricks/high-performance-syslogging-for-splunk-using-syslo...

not sure if you already know about syslog-ng, i just to update you this blog. thanks. 

0 Karma

davidwaugh
Path Finder

Thanks we already use rsyslog. I was just wondering if there was an easier way which didnt involve lots of configuration files.

Tags (1)
0 Karma

isoutamo
SplunkTrust
SplunkTrust
rsyslog is fine. We are delivering several billions messages per day with it.

If possible you should use a automation tool to generate those rsyslog config files from config files etc. That way it's manageable. And after that you could generate also splunk inputs/props/transforms based on those master configs which you are using with rsyslog. Otherwise there is too much manual work to do and maintain.
0 Karma
Get Updates on the Splunk Community!

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...