Splunk Search

Pushing certain syslog messages to an Index

dcroteau
Splunk Employee
Splunk Employee

Trying to separate leostream "broker" events that come from syslog into it's own separate index called leostream. Why is this not working? They go into the main index. I've tried the regex with and without the parentheses.

<timestamp whatever> Broker: 111.111.111.111 bla bla bla bla

Any help would be great!

indexes.conf

[leostream]
coldPath = $SPLUNK_DB/leostream/colddb
homePath = $SPLUNK_DB/leostream/db
thawedPath = $SPLUNK_DB/leostream/thaweddb

Props.conf

[syslog]
TRANSFORMS-leostream_data = LEOSTREAM

Transforms.conf

[LEOSTREAM]
REGEX = (111.111.111.111)
DEST_KEY = _MetaData:Index
FORMAT = leostream
Tags (3)
0 Karma

satishp
Explorer

I have same problem. any solution community ?

0 Karma

dcroteau
Splunk Employee
Splunk Employee

No, syslog.conf is set to my indexer over UDP 514. Very basic input setting. No forwarder involved.

0 Karma

riqbal
Communicator

I am forwarding syslog logs to central syslog server. then central syslog server is sending logs to UF.

How can I send the logs to specific index

0 Karma

ftk
Motivator

Did you restart the splunk instance after setting this up? Are you sending the syslog data to the indexer directly or to a forwarder?

0 Karma

riqbal
Communicator

UF is installed on my syslog server and UF is configured to forward logs to HF.
where should I configure index configuration.

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...