Hello,
In working with Splunk on an H.A. solution, we came up with the following. We would take all events into one indexer (A), then (A) would forward all of its events into indexer (B). We didn't want logs load balanced between both indexers, so we went with this setup.
I attempted to configure this by setting up receiving on (B) and configure forwarding on (A). However, when I do this, it looks like all data stops being collected on (A), and (B) never receives anything. I configured (A) to keep a copy of all logs to be forwarded, and I created a couple of the same indexes on (B) to test and make sure this would work.
Any help would be greatly appreciated, and thanks!
Alex
Hey Alex,
Make sure that you configure indexAndForward to "true" in the [tcpout] section of your outputs.conf on the first one seeing the data. This way the first indexer will index the data, and then forward it on to its HA partner.
Dave
Hey Alex,
Make sure that you configure indexAndForward to "true" in the [tcpout] section of your outputs.conf on the first one seeing the data. This way the first indexer will index the data, and then forward it on to its HA partner.
Dave
I had this set, but for some reason, I tried it again, and now it works! Thanks!