Getting Data In

Why am I unable to send events to a syslog server with my current heavy forwarder configuration?

michael_lee
Path Finder

Background

I tried to configure sending events to a syslog server. Here is my configurations
outputs.conf

[syslog:my_syslog]
server = 10.10.10.2:514
type = tcp
disabled = false

transforms.conf

[send_to_syslog]
REGEX = .
DEST_KEY = _SYSLOG_ROUTING
FORMAT = my_syslog

props.conf

[sourcetype::access_common]
TRANSFORMS-route = send_to_syslog

My syslog server's syslog.conf

*.* /var/log/messages

I can simulate a TCP connection on port 514 to my syslog server. However, the events are just not coming in. Any advice?

Added Splunk heavy forwarder using:

splunk enable app SplunkForwarder

./splunk add forward-server mysyslog:514 -auth admin:changeme
thanks

0 Karma
1 Solution

michael_lee
Path Finder

I have managed to send events over to my syslog server. my outputs.conf

[syslog:my_syslog]
server = 10.10.10.2:514
type=tcp
sendCookedData=false
indexAndForward = 1

View solution in original post

michael_lee
Path Finder

I have managed to send events over to my syslog server. my outputs.conf

[syslog:my_syslog]
server = 10.10.10.2:514
type=tcp
sendCookedData=false
indexAndForward = 1
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...