Syslog - UDP
Syslog - UDP
Splunk can listen on a UDP port for data coming from the syslog service on one or more hosts. You can use Splunk to gather syslog data from these hosts for easy searching, reporting and alerting.
To get syslog data over UDP, configure Splunk to listen for that data over a UDP port:
1. Go to the Syslog page in Splunk Web.
2. Then, choose "Next" under Syslog data from UDP.
3. On the next page, in the UDP port field, enter the UDP port on which you will accept connections from other systems running syslog.
The default syslog UDP port is 514.
4. Optionally, you can tell Splunk to override the default source value for your script, by putting a string into the Source name override field.
5. You can set the sourcetype of the events generated by this source by choosing From list in the Set sourcetype drop-down, then selecting the desired choice from the Select source type from list drop-down.
You will typically want to set the source type to 'syslog'.
6. Alternatively, you can choose Manually from "Set sourcetype," and then enter a string in the Source type field that appears.
You can usually leave the other fields unchanged, including the fields under the More settings option. Look here for detailed information on these fields.
7. Finally, click Save.
8. From the Success page, click Search to start searching. You can enter any term that’s in your data, or you can click on a source, source type or host to see data from the different directories within your syslog directory, the different types of data in those directories, or the different hosts that sent the syslog data in the first place.
For more information on getting data from the network, see "Get data from TCP and UDP ports" in this manual.