I am indexing a file of aggregated syslog events. The events in the file contain the IP addresses of the various hosts.
If I could input this data as a network input (TCP or UDP), I would be able to use the DNS setting on the input, and Splunk would do a reverse DNS lookup on the IPs as the events arrived. But that is not an option in this case.
I do want to index this file using the FQDN of the hosts, rather than the IP addresses. This would be more consistent with my other inputs, and I believe it would be more efficient than running external_lookup.py all the time.
Is this possible with Splunk 4.1.x?
Yes. I'm assuming you're using Splunk UDP input. If you're using a syslog server and Splunking in the resulting file, you should set up the syslog server to do the lookup when it writes to the file. With a Splunk UDP input add:
<code>connection_host = dns </code>
to the input stanza for the UDP input in inputs.conf.
DNS lookup not happening with TCP syslog 0 Answers
how to get fifo to be sourceType=syslog? 2 Answers
Managing rotated syslog files 2 Answers
Filtering syslog inputs 2 Answers