Getting Data In

How can eventdata from specific sourcetypes be forwarded to syslog on a heavy forwarder?

tylergps
Explorer

I'm trying to forward Windows logs from a Splunk indexer over to a syslog server. The indexer parses both Windows and Linux logs. I would like to only send events from a set of Windows sourcetypes over to syslog. I have tried configuring outputs.conf, props.conf, and transforms.conf as described in the guide for sending data to third party systems but don't believe it's forwarding properly.

outputs.conf (The syslog server listens on 515)

[syslog:win_syslog_group]
server = 10.10.6.13:515

props.conf

[sourcetype::win*]
TRANSFORMS-win = send_to_syslog

transforms.conf

[send_to_syslog]
REGEX = .
DEST_KEY =  _SYSLOG_ROUTING
FORMAT = win_syslog_group
0 Karma

cleelakrishna
Loves-to-Learn

the props.conf should be some thing like this
[sourcetype:win*]
TRANSFORMS-win = send_to_syslog

0 Karma

Raschko
Communicator

Did you had a look on the following option in the outputs.conf documentation:

syslogSourceType = <string>

As you obviously don't have syslog logdata, Splunk will possibly add a correct syslog header (at least timestamp+host) to your logs.

Unfortunately I don't know how it is handling the bunch of line breaks.

As rroberts suggests I would prefer TCP routing too, using the tcpout stanzas.

0 Karma
Get Updates on the Splunk Community!

Index This | I am a number, but when you add ‘G’ to me, I go away. What number am I?

March 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

What’s New in Splunk App for PCI Compliance 5.3.1?

The Splunk App for PCI Compliance allows customers to extend the power of their existing Splunk solution with ...

Extending Observability Content to Splunk Cloud

Register to join us !   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to ...