Getting Data In

splunk to forward 1 index only

Federica_92
Communicator

Hello everyone : )

I have a splunk instance with an alert manager app that is producing logs that are being indexed on the same machine as index=alerts.
I would like to forward this data to another splunk instance, without use an universal forwarder, but only changing the outputs.conf file in splunk.

Using this system, I m forwarding ALL the logs are contains in my splunk istance to the other one, but I would like to send only index=alerts.

How can I change the inputs/outputs.conf to allow this?

Thanks,
Federica

0 Karma

dcharboneau_spl
Splunk Employee
Splunk Employee

Look at this link:
http://docs.splunk.com/Documentation/Splunk/6.2.0/Forwarding/Routeandfilterdatad#Forward_data_for_a_...

Outputs.conf: in “$splunkhome$/etc/system/local/outputs.conf
Something like what is below:
[tcpout]
defaultGroup = local
indexAndForward=true
forwardedindex.0.whitelist = .*
forwardedindex.1.blacklist = _.*
forwardedindex.2.whitelist = alerts

[tcpout:whatever] -- Whatever it is set to now should work if it is already forwarding everything.

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...