Common Issues

  1. Verifying ESKM Logs on the Linux syslog-ng Server

  • After configuring eskm.conf, verify logs are received by checking:

    #tail -f /var/log/eskm/eskm.log
    
  • Ensure syslog-ng is listening on port 514 (TCP/UDP):

    #ss -tulpn | grep 514
    
  1. Verifying Ports and Connectivity from Splunk Enterprise

  • Ensure Splunk Enterprise is listening on port 9997 on your Windows machine:

    #netstat -ano | findstr 9997 
    
  • Check that the receiving port is enabled in Splunk Enterprise at Settings → Forwarding & Receiving → Receive Data → Port 9997.

Screenshot 2025-11-19 145957-20251119-092958.png


Verify receiving port

  1. Verifying Universal Forwarder Connectivity

  • Confirm the UF service is running:

    #/opt/splunkforwarder/bin/splunk status
    
  • Verify the UF is monitoring the correct log file:

    #/opt/splunkforwarder/bin/splunk list monitor
    
  • Test connectivity from UF to Splunk Enterprise:

    #nc -vz <SPLUNK_ENTERPRISE_IP> 9997
    
  1. Verifying Logs Arrive in Splunk Enterprise

  • Confirm the index exists under Settings → Indexes → eskm_index

Screenshot 2025-11-26 140601-20251126-083602.png


Verify index

  • Check if the UF has connected to Splunk by searching "index=_internal sourcetype=splunkd component=Metrics group=tcpin_connections".

Screenshot 2025-11-26 140700-20251126-083700.png


Verify UF connection

  1. Verifying Log Flow End-to-End

  • Trigger an event on ESKM (login/logout, config change).

  • Confirm the event appears in:

    • Linux syslog file (/var/log/eskm/eskm.log)

    • Splunk UF monitored file list

    • Splunk Enterprise search (index=eskm_index)