-
Notifications
You must be signed in to change notification settings - Fork 111
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SC4S does not recognized correctly VMWare vSphere logs #2390
Comments
@ivanfr90 can you copy paste one example for fallback and one for vmware:syslog for context please see examples in this test for another vendor: https://github.com/splunk/splunk-connect-for-syslog/blob/428d0d6e3c897310e25e14ad50773966bfc022d1/tests/test_netwrix_epp.py |
Hello, @ivanfr90 ! First of all problem here: You need to provide non-default port for Second thing:
Please check hostname, I think it shouldn't be IP, it should be hostname. You can look on docs that you can use host and netmask. If you using IP probably net mask would be relevant for you |
Hello @mstopa-splunk You answeded so quirkly so while was preparing some extraction yo answeded again :P Anyway some fallback message extractions:
First thing: Second thing
but seems ignored also. |
You actually had double support, my colleague and I noticed your issue the same time and you got two responses at once :) All right let me check |
@ivanfr90 take a look: not framed - port 514/[tcp|udp]
framed -- port 601/tcp
See how messages and sourcetypes changed comparing to the ones in your printcreen, the vps filter also worked: |
I'm closing this since we solved the fallback issue. For support please open a Splunk support ticket, and for bugs or enhancements please open a new issue, in both cases feel free to refer to this issue |
I see that for your test you are using standard ports: 514 and 601. thanks!! |
Hi @mstopa-splunk My current config: env_file
local/config/app_parsers/app_vps_vmware_v2.conf
local/context/splunk_metadata.csv |
hi @ivanfr90 I used a basic configuration: |
Hi @ivanfr90 thank you for your help here, in fact SC4S should have been extended with new programs: https://github.com/splunk/splunk-connect-for-syslog/pull/2462/files . To process octet-counting events please create a port dedicated to Vmware vsphere but on RFC6587:
Please use it only for framed events. They should no longer go to fallback. Please let me know if you find any missing cases, else we will include it in the release in 2 weeks. Also, it should be possible to turn off octet counting on the source side |
It will be released with next feature release. |
Was the issue replicated by support?
No
What is the sc4s version ?
sc4s version=3.22.2
Is there a pcap available?
No
Is the issue related to the environment of the customer or Software related issue?
Unknown
Is it related to Data loss, please explain ?
Seems there no data loss, but data is parcialy classified. The unclassified data are being indexing under
sc4s:fallback
Last chance index/Fallback index?
Not classified data are being sending to fallback
Is the issue related to local customization?
No
Do we have all the default indexes created?
Yes
Describe the bug
We are integrating logs from VMWare vSphere, Some logs are correctly sent to the defalt index:
index=infraops sourcetype=vmware:esxlog:
Configuration files:
env_file
app_parser
Screenshot of categorized VMWare events under
vmware:esxlog:
Screenshot of uncategorized VMWare events:
The text was updated successfully, but these errors were encountered: