Splunk Search

Pushing certain syslog messages to an Index

dcroteau
Splunk Employee
Splunk Employee

Trying to separate leostream "broker" events that come from syslog into it's own separate index called leostream. Why is this not working? They go into the main index. I've tried the regex with and without the parentheses.

<timestamp whatever> Broker: 111.111.111.111 bla bla bla bla

Any help would be great!

indexes.conf

[leostream]
coldPath = $SPLUNK_DB/leostream/colddb
homePath = $SPLUNK_DB/leostream/db
thawedPath = $SPLUNK_DB/leostream/thaweddb

Props.conf

[syslog]
TRANSFORMS-leostream_data = LEOSTREAM

Transforms.conf

[LEOSTREAM]
REGEX = (111.111.111.111)
DEST_KEY = _MetaData:Index
FORMAT = leostream
Tags (3)
0 Karma

satishp
Explorer

I have same problem. any solution community ?

0 Karma

dcroteau
Splunk Employee
Splunk Employee

No, syslog.conf is set to my indexer over UDP 514. Very basic input setting. No forwarder involved.

0 Karma

riqbal
Communicator

I am forwarding syslog logs to central syslog server. then central syslog server is sending logs to UF.

How can I send the logs to specific index

0 Karma

ftk
Motivator

Did you restart the splunk instance after setting this up? Are you sending the syslog data to the indexer directly or to a forwarder?

0 Karma

riqbal
Communicator

UF is installed on my syslog server and UF is configured to forward logs to HF.
where should I configure index configuration.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...