icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading RFC5424 Syslog
SHA256 checksum (rfc5424-syslog_11.tgz) 5e207535d1d2173630432677f898800e7d659cf1772187b0c63321a4a4e2fd92 SHA256 checksum (rfc5424-syslog_10.tgz) eb15c087fcef329f1c37102abd3d355c7d9507817c66c417ccb3e5d701c502b6
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

RFC5424 Syslog

This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
This is an Add-On for syslog data formatted according to the RFC 5424 or RFC 6587 specifications.

VERSION

Version 1.1 adds the ability to handle messages formatted according to RFC 6587.

DESCRIPTION

This is an Add-On for syslog data formatted according to the RFC 5424 or RFC 6587 specifications.

INSTALLATION

Set sourcetype="rfc5424_syslog" for all RFC5424 data inputs. This app includes
index-time transformations for the "host" field, so should be in place BEFORE
data is indexed.

AVAILABLE FIELDS

The following fields are extracted:

prival - This integer encodes the syslog facility and severity. Use the convert_facility_severity macro, described below, to decode the facility and severity fields.

appname - The field APP-NAME described in RFC5424

procid - The field PROCID described in RFC5424

msgid - The field MSGID described in RFC5424

host - The field HOSTNAME described in RFC5424. NOTE: This field is an index-time transformation

Within a structured data element (i.e., [...]), the following fields are extracted:

sdid - The field SD-ID described in RFC5424. This field is evaluated as a multi-value field.

key/value pairs - All KV pairs (i.e., field1="value1") are extracted, but are not evaluated as multi-value pairs.

SEARCH TRICKS

To extract the FACILITY and SEVERITY values from the PRIVAL value:

sourcetype="rfc5424_syslog" | `convert_facility_severity`

To convert FACILITY values into text descriptions:

sourcetype="rfc5424_syslog" | `convert_facility_severity` | lookup facility_lookup facility

To convert SEVERITY values into text descriptions:

sourcetype="rfc5424_syslog" | `convert_facility_severity` | lookup severity_lookup severity

KNOWN ISSUES/LIMITATIONS

  • Fields which appear more than once in an event (i.e., field1="value1" field1="value2") will not be evaluated as multi-value fields
  • Within a structured data block, the SDID is not associated with the local field names; it is simply another multi-value field, "sdid"
  • The MSG section of the event, if it exists, is not parsed by this app.

Release Notes

Version 1.1
May 19, 2014

Version 1.1 adds the ability to handle messages formatted according to RFC 6587.

Version 1.0
April 30, 2012

Initial release.


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.