Getting Data In

Splunk is ingesting archive files of syslog data that has already been ingested.

hrithiktej
Communicator

our setup 2 SH, 1 deployment server, 1 license server and 2 indexers , our two indexers are also syslog servers and they read the input file directly from syslog folder for indexing i suspect Splunk is ingesting archive files of syslog data that has already been ingested How do i verify this ?

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi
you can run a search like this

index=your_index
| stats count by source

and verify if the eventcount for each source is the same of the file or not.

otherwise you can run

index=your_index
| stats count by _raw
| where count>1

if there are results, you have duplicated events.

You can also verify if your monitored servers are configured to send to both the hosts or not.
The best way is to have a Load Balancer between monitored servers and Indexers to be sure of syslog flow ingestion.

Splunk can run a syslog server, and it's efficient (if you have quick disks), why do you use a syslog server on your indexers?

Bye.
Giuseppe

hrithiktej
Communicator

Thanks
I ran index=* | stats count by _raw | where count>1 for last 24hrs and I see more than 4 hundred thousand events.

We do have a f5 load balancer before the indexer/syslog cluster and I do not know why our previous splunk admin set the indexers and syslog servers on same box.

0 Karma

gcusello
SplunkTrust
SplunkTrust

It could not be a problem to have both Indexers and syslog servers on the same machines,it depends only by the load that they have to manage, if you have few events to ingest and index you can leave them on Indexers, if instead you have many events it's surely better to have two dedicated Heavy Forwarders for syslog ingestion.
Anyway per the log duplication, you have to check your F5 configuration and what is the destination host of your monitored servers, maybe they are configurated to directly send to both the Indexers addresses instead Virtual IP.
Bye.
Giuseppe
N.B.: if your satisfied by this answer, please accept or upvote it

0 Karma

hrithiktej
Communicator

From the query and the results that i told you earlier do you mean to say we have duplication of data issue? and I checked the f5 config we have both our indexers mapped to a virtual IP and all the monitored hosts like FWs and switches have this VIP entry in their logging for syslog setup.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Only one additional check, run:
index=* | stats count by host _raw
to verify if the doubled log is sent by one or two hosts (it's really difficoult that the same log is sent by different hosts!).

About the reason of this, the only possibility is that there are two sources for the same data, two sources because F5 sends to both the indexers or because there are two inputs.confs.

Verify F5 configuration.
Then check your inputs configurations to understand if there are more inputs for the same source.

Bye.
Giuseppe

0 Karma

hrithiktej
Communicator

Thanks! when i run index=* | stats count by host _raw i do see multiple logs for same ip however the count is 1

0 Karma

gcusello
SplunkTrust
SplunkTrust

Are your hostnames expressed as IPs?
If you didn't configured hostname run the same search using IP instead host.
The scope of this search is exclude same logs that arrive from different hosts.
bye.
Giuseppe

0 Karma

hrithiktej
Communicator

Thanks Even when I run index=* | stats count by IP _raw I do see multiple logs for the same IP. Is this Duplication?

0 Karma
Get Updates on the Splunk Community!

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...