Skip to content

Vendor - HAProxy

Product

Ref Link
Splunk Add-on https://splunkbase.splunk.com/app/3135/

Sourcetypes

sourcetype notes
haproxy:tcp Default syslog format
haproxy:splunk:http Splunk’s documented custom format. Note: detection is based on client_ip prefix in message

Index Configuration

key index notes
haproxy_syslog netlb none

Filter type

MSG Parse: This filter parses message content

Options

Variable default description
SC4S_LISTEN_HAPROXY_SYSLOG_RFC6587_PORT empty string Enable a UDP port for this specific vendor product using a comma-separated list of port numbers
SC4S_LISTEN_HAPROXY_SYSLOG_UDP_PORT empty string Enable a UDP port for this specific vendor product using a comma-separated list of port numbers
SC4S_ARCHIVE_HAPROXY_SYSLOG no Enable archive to disk for this specific source
SC4S_DEST_HAPROXY_SYSLOG_HEC no When Splunk HEC is disabled globally set to yes to enable this specific source

Verification

An active site will generate frequent events use the following search to check for new events

Verify timestamp, and host values match as expected

index=<asconfigured> (sourcetype=haproxy*")