Getting Data In

Configuring inputs.conf to send data to specific Index

splunk_kk
Path Finder

I have a Splunk setup defined like: Universal Forwarder ---->Heavy Forwarder ------>Indexer

I need that all the logs hitting my Indexer should go to specific index. Which option is better:

1) Configuring index= new_index in Universal forwarder's input.conf
2) Configuring index= new_index in Heavy forwarder's input.conf
3) Configuring index= new_index in Indexer's input.conf

0 Karma

jtacy
Builder

Presonally, I would try to stick to setting this at the Universal Forwarder if possible. I don't think there's a significant processing cost to routing at the other tiers, but once you have a larger environment I think it would be a hassle to figure out why events are ending up in various indexes. I guess my philosophy is that if something can be done on the UF, that's probably the way to go.

That said, I probably wouldn't hesitate to select indexes on the HF or Indexer if I needed to make a change quickly and didn't have control of the UFs. If you ever want to select indexes based on something in the events themselves, such as the raw data, you're going to end up making that change on the HF or Indexer.

Good luck!

0 Karma
Get Updates on the Splunk Community!

What's new in Splunk Cloud Platform 9.1.2312?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.1.2312! Analysts can ...

What’s New in Splunk Security Essentials 3.8.0?

Splunk Security Essentials (SSE) is an app that can amplify the power of your existing Splunk Cloud Platform, ...

Let’s Get You Certified – Vegas-Style at .conf24

Are you ready to level up your Splunk game? Then, let’s get you certified live at .conf24 – our annual user ...