Getting Data In

Changing Syslog Source type for directories

nkitmitto
Explorer

We're using Syslog-ng in our environment and have a forwarder setup on syslog-ng to forward the logs to Splunk. But when they're indexed in Splunk, the sourcetype is "syslog". Is it possible to set this to the actual source type? For example our syslog-ng directory structure looks like such:

/logs/log-type/hostname/

I want to be able to set log-type to be the sourcetype in Splunk. It has to be possible!

1 Solution

kristian_kolb
Ultra Champion

You would have to set up different monitor stanzas in inputs.conf on the forwarder, e.g.;

[monitor:///logs/nginx/*/]
index = your_index
sourcetype = nginx
host_segment = 3

[monitor:///logs/cisco/*/]
index = your_index
sourcetype = cisco
host_segment = 3

etc etc

If you do not specify sourcetype (which I assume you have not done) Splunk will probably identify and classify it as syslog. And syslog is a sourcetype (the only one I think) where Splunk will automatically extract and set the host for each event in the log individually, i.e. not on a per file basis.

Therefore you will also have to set the host value manually, but the host_segment lets you set this from the path being monitored.

Hope this helps,

Kristian

View solution in original post

nkitmitto
Explorer

In the inputs file, I have this and it worked:

[monitor:///logs/static-httpd-error-log/*/*.log]
sourcetype = static-httpd-error-log
index = main
host_segment = 3

Thanks for the help!

0 Karma

kristian_kolb
Ultra Champion

you are most welcome. /k

0 Karma

kristian_kolb
Ultra Champion

You would have to set up different monitor stanzas in inputs.conf on the forwarder, e.g.;

[monitor:///logs/nginx/*/]
index = your_index
sourcetype = nginx
host_segment = 3

[monitor:///logs/cisco/*/]
index = your_index
sourcetype = cisco
host_segment = 3

etc etc

If you do not specify sourcetype (which I assume you have not done) Splunk will probably identify and classify it as syslog. And syslog is a sourcetype (the only one I think) where Splunk will automatically extract and set the host for each event in the log individually, i.e. not on a per file basis.

Therefore you will also have to set the host value manually, but the host_segment lets you set this from the path being monitored.

Hope this helps,

Kristian

nkitmitto
Explorer

This goes on the forwarder? Or should it be on the inputs.conf on the index?

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...