Splunk® Enterprise

Getting Data In

Download manual as PDF

Splunk Enterprise version 6.x is no longer supported as of October 23, 2019. See the Splunk Software Support Policy for details. For information about upgrading to a supported version, see How to upgrade Splunk Enterprise.
This documentation does not apply to the most recent version of Splunk. Click here for the latest version.
Download topic as PDF

Syslog - TCP

Splunk can listen on a TCP port for data coming from the syslog service on one or more hosts. You can use Splunk to gather syslog data from these hosts for easy searching, reporting and alerting.

To get syslog data over TCP, configure Splunk to listen on a network port for incoming syslog data:

1. Go to the Syslog page in Splunk Web.

2. Then, choose "Next" under Syslog data from TCP.

3. On the next page, in the TCP port field, enter the TCP port on which you will accept connections from other systems running syslog.

4. You then decide whether or not to Accept connections from all hosts. Do so by checking either the Yes or No, restrict to one host radio buttons.

If you select No, restrict to one host, another field named Host Restriction appears. Enter the name of one valid host on your network - Splunk will only accept connections from that computer.

5. Optionally, you can tell Splunk to override the default source value for your script, by putting a string into the Source name override field.

6. You can also set the sourcetype of the events generated by this source by choosing From list in the Set sourcetype drop-down, then selecting the desired choice from the Select source type from list drop-down.

You will typically want to set the source type to 'syslog'.

7. Alternatively, you can choose Manually from "Set sourcetype," and then enter a string in the Source type field that appears.

You can usually leave the other fields unchanged, including the fields under the More settings option.

8. Finally, click Save.

9. From the Success page, click Search to start searching. You can enter any term that’s in your data, or you can click on a source, source type or host to see data from the different directories within your syslog directory, the different types of data in those directories, or the different hosts that sent the syslog data in the first place.

For more information on getting data from the network, see "Get data from TCP and UDP ports" in this manual.

Last modified on 23 October, 2014
Syslog - local
Syslog - UDP

This documentation applies to the following versions of Splunk® Enterprise: 6.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.0.12, 6.0.13, 6.0.14, 6.0.15, 6.1, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.1.7, 6.1.8, 6.1.9, 6.1.10, 6.1.11, 6.1.12, 6.1.13, 6.1.14

Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters