I'm setting up logging with Sonicwall firewalls. They support syslog. Do I send it to syslog on a linux system or send it directly to splunk via a port? If I setup multiple firewalls to log the same instance and I use the system syslog do I separate the log files in the syslog configuration?
You can send your syslog events directly to Splunk. Just setup up a UDP input (default port 514 for syslog) or a non default port if you wish.
You'll then be able to search and categorize your syslog events in Splunk based on which host (sonic firewall) they came from, or any other fields in the syslog event that identify the origin.You can also dynamically set the source and sourcetype or route the syslog events to different indexes when everything is coming in over the same UDP port using entrys in transforms.conf.
You can send your syslog events directly to Splunk. Just setup up a UDP input (default port 514 for syslog) or a non default port if you wish.
You'll then be able to search and categorize your syslog events in Splunk based on which host (sonic firewall) they came from, or any other fields in the syslog event that identify the origin.You can also dynamically set the source and sourcetype or route the syslog events to different indexes when everything is coming in over the same UDP port using entrys in transforms.conf.
This may also be of interest: http://wiki.splunk.com/Community:Best_Practice_For_Configuring_Syslog_Input
Thanks that worked great.