Splunk Enterprise

Splunk Add-on for F5 BIG-IP: Configuring iRules for F5 GTM

Will_powr
Explorer

https://docs.splunk.com/Documentation/AddOns/released/F5BIGIP/Setup

 

I have two issues:

1. In the Splunk docs, the provided log format for DNS logging is prefixed with "<190>". I believe this number represents the facility(local7) and severity(info). The DNS request/response events do not have log_levels associated with and I assume this is the reason. I don't know if the syslog servers or Splunk are doing something wrong.

2. The "answer" field in the DNS response events is a quoted string that looks like this" "test1.f5lab.dhs.gov*. 5 IN A someIpAddress". But when displayed in Splunk, something has replaced the tabs with some kind of ASCll string. Splunk shows the answer field value pair as such: "test1.f5lab.dhs.gov. #0155#011IN#011A#someIpAddress. I'm unsure is this is happening on the syslog server or Splunk side.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...