Splunk Search

Pushing certain syslog messages to an Index

dcroteau
Splunk Employee
Splunk Employee

Trying to separate leostream "broker" events that come from syslog into it's own separate index called leostream. Why is this not working? They go into the main index. I've tried the regex with and without the parentheses.

<timestamp whatever> Broker: 111.111.111.111 bla bla bla bla

Any help would be great!

indexes.conf

[leostream]
coldPath = $SPLUNK_DB/leostream/colddb
homePath = $SPLUNK_DB/leostream/db
thawedPath = $SPLUNK_DB/leostream/thaweddb

Props.conf

[syslog]
TRANSFORMS-leostream_data = LEOSTREAM

Transforms.conf

[LEOSTREAM]
REGEX = (111.111.111.111)
DEST_KEY = _MetaData:Index
FORMAT = leostream
Tags (3)
0 Karma

satishp
Explorer

I have same problem. any solution community ?

0 Karma

dcroteau
Splunk Employee
Splunk Employee

No, syslog.conf is set to my indexer over UDP 514. Very basic input setting. No forwarder involved.

0 Karma

riqbal
Communicator

I am forwarding syslog logs to central syslog server. then central syslog server is sending logs to UF.

How can I send the logs to specific index

0 Karma

ftk
Motivator

Did you restart the splunk instance after setting this up? Are you sending the syslog data to the indexer directly or to a forwarder?

0 Karma

riqbal
Communicator

UF is installed on my syslog server and UF is configured to forward logs to HF.
where should I configure index configuration.

0 Karma
Get Updates on the Splunk Community!

Take Your Breath Away with Splunk Risk-Based Alerting (RBA)

WATCH NOW!The Splunk Guide to Risk-Based Alerting is here to empower your SOC like never before. Join Haylee ...

Industry Solutions for Supply Chain and OT, Amazon Use Cases, Plus More New Articles ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Enterprise Security Content Update (ESCU) | New Releases

In November, the Splunk Threat Research Team had one release of new security content via the Enterprise ...