Hi, i hope someone can help us, please.
We have to send our logs that we receive from Firewall's, Sysmon, etc from Splunk Enterprise to another device called Elastic Search throught syslog.
Our configuration by Splunk is in /opt/splunk and we create a file in /opt/splunk/etc/system/local called outputs.conf
Our configuration is next:
[root@SPLUNK2 local]# cat outputs.conf
defaultGroup = syslogGroup
[syslog: syslogGroup]
server = xxx.xxx.xxx.xxx:514
We restart the splunk throught GUI in settings > server control, but we didn't see logs outgoing.
Regargds
The easiest method would be to install Logstash on the box where you are collecting logs and use it to forward them on to ELK.
Logstash is essentially Elastic's equivalent of Splunks Universal Forwarder.
It's easy to set up and designed to do exactly what you're attempting.
The easiest method would be to install Logstash on the box where you are collecting logs and use it to forward them on to ELK.
Logstash is essentially Elastic's equivalent of Splunks Universal Forwarder.
It's easy to set up and designed to do exactly what you're attempting.
@codebuilder, thanks for your answer, we are checking the documentation of splunk to try send the logs without install logstash.
[https://docs.splunk.com/Documentation/Splunk/7.2.6/Forwarding/Forwarddatatothird-partysystemsd]
check this out - https://logz.io/blog/migrating-from-splunk-to-elk/
@Sukisen1981 Thanks for the information.