Splunk Enterprise

Problem parsing bluecoat logs

tdepablo88
Explorer

Hello,

I have an issue with Symantec Bluecoat Proxy SG when i index data to a heavy forwarder. The logs didn't parse correctly and the coverage is less than 5% of the total events, the sourcetype defined is bluecoat:proxysg:access:syslog.

What is the correct format of the log?.

An example of the log received is attached.

Thanks in advance.

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...