Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading RFC5424 Syslog
SHA256 checksum (rfc5424-syslog_11.tgz) 51514c1b7494549230d7fce3dd7d5b9b50278bac47f747fef0317e2524a1956b SHA256 checksum (rfc5424-syslog_10.tgz) 951316808d6eea2cb08ce4e6251acaed0c9c835ed74ee83235c606c3ca7b76f4
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

RFC5424 Syslog

Overview
Details
This is an Add-On for syslog data formatted according to the RFC 5424 or RFC 6587 specifications.

VERSION

Version 1.1 adds the ability to handle messages formatted according to RFC 6587.

DESCRIPTION

This is an Add-On for syslog data formatted according to the RFC 5424 or RFC 6587 specifications.

INSTALLATION

Set sourcetype="rfc5424_syslog" for all RFC5424 data inputs. This app includes
index-time transformations for the "host" field, so should be in place BEFORE
data is indexed.

AVAILABLE FIELDS

The following fields are extracted:

> prival - This integer encodes the syslog facility and severity. Use the convert_facility_severity macro, described below, to decode the facility and severity fields.

> appname - The field APP-NAME described in RFC5424

> procid - The field PROCID described in RFC5424

> msgid - The field MSGID described in RFC5424

> host - The field HOSTNAME described in RFC5424. NOTE: This field is an index-time transformation

Within a structured data element (i.e., [...]), the following fields are extracted:
> sdid - The field SD-ID described in RFC5424. This field is evaluated as a multi-value field.

> key/value pairs - All KV pairs (i.e., field1="value1") are extracted, but are not evaluated as multi-value pairs.

SEARCH TRICKS

To extract the FACILITY and SEVERITY values from the PRIVAL value:

sourcetype="rfc5424_syslog" | `convert_facility_severity`

To convert FACILITY values into text descriptions:

sourcetype="rfc5424_syslog" | `convert_facility_severity` | lookup facility_lookup facility

To convert SEVERITY values into text descriptions:

sourcetype="rfc5424_syslog" | `convert_facility_severity` | lookup severity_lookup severity

KNOWN ISSUES/LIMITATIONS

  • Fields which appear more than once in an event (i.e., field1="value1" field1="value2") will not be evaluated as multi-value fields
  • Within a structured data block, the SDID is not associated with the local field names; it is simply another multi-value field, "sdid"
  • The MSG section of the event, if it exists, is not parsed by this app.

Release Notes

Version 1.1
May 19, 2014

Version 1.1 adds the ability to handle messages formatted according to RFC 6587.

Version 1.0
April 30, 2012

Initial release.

112
Installs
1,931
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2018 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.