All Apps and Add-ons

Reporting only one unique device

cboillot
Contributor

The dashboard is only showing me that I have 1 unique device. Digging into it, It looks like it is seeing the syslog server as the only device. I notice that some of the fields do have a "reported_hostname" field. How do I get those entries have have this to show this as the host field?

0 Karma
1 Solution

cboillot
Contributor

So I fixed my issue. I took the local7 out of the monitor stanza, and, this is the most important change, I changed recursive to true.

View solution in original post

0 Karma

cboillot
Contributor

So I fixed my issue. I took the local7 out of the monitor stanza, and, this is the most important change, I changed recursive to true.

0 Karma

adonio
Ultra Champion

please provide more info, what kind of devices are those?
are you using any of the pre-built splunk apps?
also might be related to how you write data to syslog
hope it slightly helps

0 Karma

cboillot
Contributor

several different kinds. we have routers, switches, ASAs, ect.

We are using the "Cisco Networks App for Splunk Enterprise" and the "Splunk Add-on for Cisco Networks"

0 Karma

adonio
Ultra Champion

how do you bring the data from syslog to splunk? universal forwarder? directly over TCP / UDP?

0 Karma

cboillot
Contributor

universal forwarder

0 Karma

adonio
Ultra Champion

what is the sourcetype you have under your inputs stanza?

0 Karma

cboillot
Contributor

cisco:ios

0 Karma

adonio
Ultra Champion

do you have the TA installed?
https://splunkbase.splunk.com/app/1467/#/details

0 Karma

cboillot
Contributor

Yes, it is showing as being installed. Version 2.3.4.

0 Karma

adonio
Ultra Champion

can you kindly share your inputs.conf on the forwarder?

0 Karma

cboillot
Contributor
[default]
ignoreOlderThan = 10d
blacklist = \.(gz|bz2|z|zip)$
recursive = false
index = main

[monitor:///var/agency_logs/AgencySyslog]
sourcetype=cisco:ios
0 Karma

adonio
Ultra Champion

are all devices placing their data in one folder, AgencySyslog?

0 Karma

cboillot
Contributor

They are all placing their data into the single file AgencySyslog.

0 Karma

adonio
Ultra Champion
0 Karma

cboillot
Contributor

I will pass this information along and see what happens. Thank you.

0 Karma

cboillot
Contributor

so, they redid the directories and now we have this:

/var/agency_logs/cisco/ios/<hostname>/<syslogfacility-text>/<syslogseverity-text>/<year-month-day>.log

and I have that entered in as

[monitor:///var/agency_logs/cisco/ios/*/local7/*/*.log]
host_segment = 5

However, these are not being pulled in for some reason.

0 Karma

adonio
Ultra Champion

try this:
[monitor:///var/agency_logs/cisco/ios/.../local7/.../*.log]
host_segment = 5

0 Karma

cboillot
Contributor

Done. But it still isn't pulling the data in.

here is my inputs.conf file:

[default]

ignoreOlderThan = 10d
blacklist = \.(gz|bz2|z|zip)$
recursive = false
index = main
# index = enterprise_90days
sourcetype = cisco:ios
crcSalt = <SOURCE>

# Windows platform specific input processor.

[monitor:///var/agency_logs/cisco/ios/.../local7/.../*.log]
host_segment = 5

# [monitor:///var/agency_logs/AgencySyslogWLC]

# [monitor:///var/agency_logs/AgencySyslog]
0 Karma

adonio
Ultra Champion

can you double check the full path to file and compare with examples here:
https://docs.splunk.com/Documentation/SplunkCloud/6.6.0/Data/Specifyinputpathswithwildcards

0 Karma

cboillot
Contributor

So I fixed my issue. I took the local7 out of the monitor stanza, and, this is the most important change, I changed recursive to true.

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...