I have configured approx. 100 access points to send syslog events to both Splunk and to a kiwi syslog server I have set up on a Windows 7 PC. (Splunk is installed on a fairly high powered Linux server). When I compare the events logged in Splunk to the events captured in the kiwi server and on the access points themselves, I see a huge difference. I can have over 2100 events from an access point captured in my kiwi server, (verified by looking at the AP itself), while I see 4 events in Splunk.
I have looked at the Manager>Systems Settings>System Logging logging levels, and they are set to INFO, and I looked at the configuration in $SPLUNK_HOME/etc/log.cfg. I see rootCategory=INFO,A1. I have scanned through these questions, but could not find one posted that seemed to help with this.
What else should I look at regarding Splunk's configuration? Even though I see a huge discrepancy between Splunk's syslog events and kiwi's, I still see a great number of events in Splunk's Search window.
... View more