Syslog receiver 🔗
The Syslog receiver parses Syslogs received over TCP or UDP. The supported pipeline type is
logs. See Process your data with pipelines for more information.
Get started 🔗
Follow these steps to configure and activate the component:
Deploy the Splunk Distribution of OpenTelemetry Collector to your host or container platform:
Configure the Syslog receiver as described in the next section.
Restart the Collector.
Sample configurations 🔗
To activate the Syslog receiver, add
syslog to the
receivers section of your configuration file, as in the following sample configurations. See Settings for more details.
This example shows how to configure logs received using TCP:
receivers: syslog: tcp: listen_address: "0.0.0.0:54526" protocol: rfc5424
This example shows how to configure logs received using UDP:
receivers: syslog: udp: listen_address: "0.0.0.0:54526" protocol: rfc3164 location: UTC
Configure your connection 🔗
Use the following fields to configure your connection. For more details, see the section Settings.
Configure TCP 🔗
You can use the following fields to configure the Syslog receiver with a TCP connection:
listen_address. A listening address with the format
max_buffer_size. Maximum size of buffer that can be allocated while reading a TCP input.
tls. Optional TLS configuration for the
cert_file. Path to the TLS certificate you want to use for TLS required connections.
key_file. Path to the TLS key you want to use for TLS required connections.
ca_file. Path to the CA certificate. For a client this verifies the server certificate. For a server this verifies client certificates. If empty, it uses the system’s root CA.
client_ca_file. Optional. Path to the TLS certificate the server uses to verify a client certificate. This sets the ClientCAs and ClientAuth to RequireAndVerifyClientCert in the TLSConfig. See https://godoc.org/crypto/tls#Config for more information.
Configure UDP 🔗
The following field is required:
listen_address: A listening address with the format
Use operators to format logs 🔗
The Syslog receiver uses operators to parse Syslogs into a desired format. Each operator fulfills a single responsibility, such as reading lines from a file, or parsing JSON from a field. You need to chain operators together in a pipeline to achieve your desired result.
All operators either create, modify, or consume entries.
An entry is the base representation of log data as it moves through a pipeline.
A field is used to reference values in an entry.
A common expression syntax is used in several operators. For example, expressions can be used to filter or route entries.
Available operators 🔗
For a complete list of available operators, see What operators are available? in GitHub.
The following applies to operators:
Each operator has a
You can give a unique Id to each operator.
If you use the same type of operator more than once in a pipeline, you must specify an Id.
Otherwise, the Id defaults to the value of
An operator outputs to the next operator in the pipeline.
The last operator in the pipeline emits from the receiver.
Optionally, you can use the output parameter to specify the Id of another operator to pass logs there directly.
Parsers with embedded operations 🔗
You can configure many parsing operators to embed certain follow-up operations such as timestamp and severity parsing.
For more information, see the the GitHub entry on complex parsers at Parsers .
Advanced configurations 🔗
You can find more examples in the GitHub repository splunk-otel-collextor/examples .
The following table shows the configuration options for the Syslog receiver:
If you are a Splunk Observability Cloud customer and are not able to see your data in Splunk Observability Cloud, you can get help in the following ways.
Available to Splunk Observability Cloud customers
Available to prospective customers and free trial users
Ask a question and get answers through community support at Splunk Answers .
Join the Splunk #observability user group Slack channel to communicate with customers, partners, and Splunk employees worldwide. To join, see Chat groups in the Get Started with Splunk Community manual.
To learn about even more support options, see Splunk Customer Success .