Splunk Syslog Forwarding
Apica provides a unified Syslog Forwarding integration with two variants, both using TCP. The only difference lies in payload format:
Raw Syslog (
syslog_tcp
)CEF-formatted Syslog (
syslog_tcp_cef
)

Supported Formats
Both forwarders use TCP-only. UDP is not supported.
Raw Syslog (
syslog_tcp
) - For general, unstructured syslog messages.CEF Syslog (
syslog_tcp_cef
) - For structured CEF logs (e.g., security events). Payload must start withCEF:
.
UI Setup Steps
Navigate to Integrations → Forwarders.
Click Add Forwarder.
Select the appropriate type:
Universal forwarder (Syslog, TCP) — for Raw Syslog
Universal forwarder (Syslog, TCP, CEF) — for CEF logs
Fill in the form fields:
Name
Identifier for the forwarder (e.g., splunk-raw
)
Host
Splunk hostname or IP receiving syslog messages
Port
TCP port (e.g., 1514
)
Type
syslog_tcp
or syslog_tcp_cef
Buffer size
Optional buffer size limit (bytes)
Default
Set as default forwarder if applicable
🔍 Behavior
Raw Syslog (
syslog_tcp
) Wrapped in RFC5424 format:"<priority>1 timestamp namespace app proc_id - - message\n"
CEF Syslog (
syslog_tcp_cef
)Must have
message_raw
starting withCEF:
(e.g.,CEF:0|...
orCEF:1|...
)Otherwise, dropped with an error log.
Important Notes
Select type based on payload — use Raw for general logs, CEF for structured events.
CEF payloads must start with
CEF:
. Non-compliant ones are dropped.Ensure your Splunk instance is correctly configured:
For Raw Syslog: standard TCP Syslog input.
For CEF: CEF parser/add-on or appropriate sourcetype configured.
Note this needs you to enable the syslog receive ports on the Splunk instance.
If logs aren't appearing in Splunk:
Verify TCP listener is active on Splunk.
Check the logs if the messages are getting dropped due to invalid payload or blocked network.
Last updated
Was this helpful?