Splunk Search

Pushing certain syslog messages to an Index

dcroteau
Splunk Employee
Splunk Employee

Trying to separate leostream "broker" events that come from syslog into it's own separate index called leostream. Why is this not working? They go into the main index. I've tried the regex with and without the parentheses.

<timestamp whatever> Broker: 111.111.111.111 bla bla bla bla

Any help would be great!

indexes.conf

[leostream]
coldPath = $SPLUNK_DB/leostream/colddb
homePath = $SPLUNK_DB/leostream/db
thawedPath = $SPLUNK_DB/leostream/thaweddb

Props.conf

[syslog]
TRANSFORMS-leostream_data = LEOSTREAM

Transforms.conf

[LEOSTREAM]
REGEX = (111.111.111.111)
DEST_KEY = _MetaData:Index
FORMAT = leostream
Tags (3)
0 Karma

satishp
Explorer

I have same problem. any solution community ?

0 Karma

dcroteau
Splunk Employee
Splunk Employee

No, syslog.conf is set to my indexer over UDP 514. Very basic input setting. No forwarder involved.

0 Karma

riqbal
Communicator

I am forwarding syslog logs to central syslog server. then central syslog server is sending logs to UF.

How can I send the logs to specific index

0 Karma

ftk
Motivator

Did you restart the splunk instance after setting this up? Are you sending the syslog data to the indexer directly or to a forwarder?

0 Karma

riqbal
Communicator

UF is installed on my syslog server and UF is configured to forward logs to HF.
where should I configure index configuration.

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...