

Where does Splunk Forwarders come into play here? (I knew you would ask) The Splunk monitor stanza would look like this: For example, /var/log/archive/hosts/hostname/…/
#SPLUNK SERVER.CONF ARCHIVE#
To configure your Splunk host to properly get the hostname on a log archive with syslog-ng, you would have to make sure syslog-ng is creating the hostname in the path. Splunk can still be easily configured to monitor the target path and easily handle the naming of incoming systems, events, and dates. Also, syslog-ng allows you to pre-filter messages upon their arrival into “buckets” to give you better control over your logs. If you have too many messages for the network, interface, or host you are running syslog on you will drop data. Syslog-ng allows you to use TCP rather than UDP to send your log messages. I like to recommend syslog-ng for both large scale deployments, and deployments where there is significant traffic. On the sender hosts append to the end of the file “*.* Add an entry to your /etc/hosts file for the IP address of “LOGHOST”Īssuming your receiver has the /var/log directory set up create an nf in your $SPLUNK_HOME/etc/system/local/ directory with the following stanza.

Append -r to the SYSLOGD_OPTIONS=”-m 0 -r” On most systems these days the syslog flags are configured in the /etc/sysconfig/syslog file.

“What are you currently running in your infrastructure? Do you have a log archive? What are you comfortable configuring?” I often get asked, which is better for Log Management Syslog, Syslog-ng or Splunk Forwarders… More information can be found in our blog post, here.
#SPLUNK SERVER.CONF UPDATE#
I mportant Update as of : Splunk has released Splunk Connect for Syslog (SC4S) and solution for syslog data sources.
