@Leonardo1998   In addition to other recommendations:  You can configure a dedicated VM and install either syslog-ng or rsyslog, making it act as a syslog forwarder.  Network Devices (such as firewalls, routers, and switches) can then be configured to send logs over a custom port to this syslog forwarder.  On the syslog forwarder, update the syslog-ng.conf or rsyslog.conf to capture these logs and store them in a specific directory.  From here, you have two options:    Install the Splunk Universal Forwarder (UF) on the server and configure it to forward the logs to the Splunk indexers.    Or, install the full Splunk Enterprise package on the server and use it as a Heavy Forwarder (HF).    If the server is used as a Heavy Forwarder, you can also install the relevant Technology Add-ons (TAs) for parsing. For example, if you're onboarding Fortinet firewall logs, you can install the Fortinet Add-on on this HF for proper parsing before forwarding the logs to the indexers.  https://www.splunk.com/en_us/blog/tips-and-tricks/using-syslog-ng-with-splunk.html?locale=en_us  
						
					
					... View more