Getting Data In

what should I do if the Indexers don't receive logs for a syslog server-based log file, for more than 5 minutes

abhishekdubey00
Engager

Syslog Server Source Feed Check' was triggered. It is raised when the Indexers don't receive logs for a syslog server-based log file, for more than 5 minutes

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

First, is it normal for that log file to be quiet for 5 minutes? If so, change the alert interval.
If this is an abnormal condition, you need to find the cause. Verify the forwarder on the syslog server is still running and in communication with your indexers. Verify the syslog process is still running. Verify the source is still sending events to the syslog server.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

First, is it normal for that log file to be quiet for 5 minutes? If so, change the alert interval.
If this is an abnormal condition, you need to find the cause. Verify the forwarder on the syslog server is still running and in communication with your indexers. Verify the syslog process is still running. Verify the source is still sending events to the syslog server.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...