Need Collector Plugin for Splunk

Idea ID 2787050

Need Collector Plugin for Splunk

Hi,
I have an issues when Splunk SIEM forwards the logs towards Sentinel Collector. I received the logs coming from 1 node which have multiple logs per devices(Palo Alto FW, FortiGate UTM, imsva, Microsoft Active Directory and Windows, Unix/Linux and more) with different kind of log format.
It means 1 Event Source contains mixed log format like CEF, Comma delimited, Key-Value pair from multiple devices in this single Event Source. We try to use CEF collector based on support suggestion but it got issue and randomly dropping events.
If Microfocus team can provide us the right Collector for Splunk it will be a big help for me because we require it to be used in production environment ASAP. Thanks.
1 Comment
Absent Member.
Absent Member.
Dear Microfocus, kindly expedite
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.