All Apps and Add-ons

Reporting only one unique device

cboillot
Contributor

The dashboard is only showing me that I have 1 unique device. Digging into it, It looks like it is seeing the syslog server as the only device. I notice that some of the fields do have a "reported_hostname" field. How do I get those entries have have this to show this as the host field?

0 Karma
1 Solution

cboillot
Contributor

So I fixed my issue. I took the local7 out of the monitor stanza, and, this is the most important change, I changed recursive to true.

View solution in original post

0 Karma

cboillot
Contributor

So I fixed my issue. I took the local7 out of the monitor stanza, and, this is the most important change, I changed recursive to true.

0 Karma

adonio
Ultra Champion

please provide more info, what kind of devices are those?
are you using any of the pre-built splunk apps?
also might be related to how you write data to syslog
hope it slightly helps

0 Karma

cboillot
Contributor

several different kinds. we have routers, switches, ASAs, ect.

We are using the "Cisco Networks App for Splunk Enterprise" and the "Splunk Add-on for Cisco Networks"

0 Karma

adonio
Ultra Champion

how do you bring the data from syslog to splunk? universal forwarder? directly over TCP / UDP?

0 Karma

cboillot
Contributor

universal forwarder

0 Karma

adonio
Ultra Champion

what is the sourcetype you have under your inputs stanza?

0 Karma

cboillot
Contributor

cisco:ios

0 Karma

adonio
Ultra Champion

do you have the TA installed?
https://splunkbase.splunk.com/app/1467/#/details

0 Karma

cboillot
Contributor

Yes, it is showing as being installed. Version 2.3.4.

0 Karma

adonio
Ultra Champion

can you kindly share your inputs.conf on the forwarder?

0 Karma

cboillot
Contributor
[default]
ignoreOlderThan = 10d
blacklist = \.(gz|bz2|z|zip)$
recursive = false
index = main

[monitor:///var/agency_logs/AgencySyslog]
sourcetype=cisco:ios
0 Karma

adonio
Ultra Champion

are all devices placing their data in one folder, AgencySyslog?

0 Karma

cboillot
Contributor

They are all placing their data into the single file AgencySyslog.

0 Karma

adonio
Ultra Champion
0 Karma

cboillot
Contributor

I will pass this information along and see what happens. Thank you.

0 Karma

cboillot
Contributor

so, they redid the directories and now we have this:

/var/agency_logs/cisco/ios/<hostname>/<syslogfacility-text>/<syslogseverity-text>/<year-month-day>.log

and I have that entered in as

[monitor:///var/agency_logs/cisco/ios/*/local7/*/*.log]
host_segment = 5

However, these are not being pulled in for some reason.

0 Karma

adonio
Ultra Champion

try this:
[monitor:///var/agency_logs/cisco/ios/.../local7/.../*.log]
host_segment = 5

0 Karma

cboillot
Contributor

Done. But it still isn't pulling the data in.

here is my inputs.conf file:

[default]

ignoreOlderThan = 10d
blacklist = \.(gz|bz2|z|zip)$
recursive = false
index = main
# index = enterprise_90days
sourcetype = cisco:ios
crcSalt = <SOURCE>

# Windows platform specific input processor.

[monitor:///var/agency_logs/cisco/ios/.../local7/.../*.log]
host_segment = 5

# [monitor:///var/agency_logs/AgencySyslogWLC]

# [monitor:///var/agency_logs/AgencySyslog]
0 Karma

adonio
Ultra Champion

can you double check the full path to file and compare with examples here:
https://docs.splunk.com/Documentation/SplunkCloud/6.6.0/Data/Specifyinputpathswithwildcards

0 Karma

cboillot
Contributor

So I fixed my issue. I took the local7 out of the monitor stanza, and, this is the most important change, I changed recursive to true.

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...