As a Splunk admin, you need to easily ingest syslog data, at scale, while removing the requirement of up-front design work and “syslog-fu”. You need a turnkey, scalable, and repeatable approach for syslog data ingestion. Therefore, you download the Splunk Connect for Syslog Add-on, which enables you to achieve the following:
- Transport syslog data into Sp lunk at extremely high scale (> 5 TB/day from a single instance to multiple indexers)
- Properly categorize (sourcetype) for the most common data sources, with little to no custom configuration
- Provide enhanced data enrichment beyond the standard Splunk metadata of timestamp, host, source, and sourcetype
- Provide for additional custom-designed “filters” for additional sourcetypes beyond those supported out of the box
Now, you want some recommendations so you can be sure you have implemented the add-on the best way possible in your environment.
How to use Splunk software for this use case
As you use the Splunk Connect for Syslog add-on, you may find some or all of the following best practices helpful:
Implementing these best practices will help you customize your deployment and use syslog data more efficently and effectively. In addition, Splunk Connect for Syslog is fully Splunk supported and is released as open source. Join the community to provide feedback, enhancement ideas, communication, and log path (filter) creation Formal request for feature (especially log path/filters) inclusion, bug tracking, and more can be conducted via the GitHub repo.
Finally, the content in this guide comes from a previously published blog, one of the thousands of Splunk resources available to help users succeed. These additional Splunk resources might help you understand and implement this use case: