Hello, Here is the deal, I am following this link to ingest cisco umbrella logs into splunk: https://support.umbrella.com/hc/en-us/articles/360001388406-Configuring-Splunk-with-a-Cisco-managed-S3-Bucket (I know, you will say: why not use one of the existing apps in SplunkBase? I will say: I really don't know which one to use, they seem doing the same thing, plus I just want the raw logs, so getting the logs directly from the bucket is good enough 🙂 ) I downloaded the logs and stored them in the HF under /opt/ciscologs/ and i configured a simple inputs.conf file to read those files with the idea that these logs will be sent to the indexers (because I already have the output file with the config to send data from HF to indexers)
But, I dont see any logs being indexed, I dont see any events on the search head 😞
here is the inputs.conf in the HF: [monitor:///opt/ciscologs/dnslogs/*] index = index_name sourcetype = csv #whitelist = 2023-*/* disabled = 0 crcSalt = <SOURCE> #_TCP_ROUTING = default-autolb-group
(the commented lines are settings that i have tried but still no luck.)
Any suggestions here? I am out of ideas
Thanks.
... View more