Splunk Enterprise

Problem parsing bluecoat logs

tdepablo88
Explorer

Hello,

I have an issue with Symantec Bluecoat Proxy SG when i index data to a heavy forwarder. The logs didn't parse correctly and the coverage is less than 5% of the total events, the sourcetype defined is bluecoat:proxysg:access:syslog.

What is the correct format of the log?.

An example of the log received is attached.

Thanks in advance.

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...

The Latest Cisco Integrations With Splunk Platform!

Join us for an exciting tech talk where we’ll explore the latest integrations in Cisco + Splunk! We’ve ...

AI Adoption Hub Launch | Curated Resources to Get Started with AI in Splunk

Hey Splunk Practitioners and AI Enthusiasts! It’s no secret (or surprise) that AI is at the forefront of ...