I'm running a Splunk instance on a beefy linux system that has all of my indexes.
I had to add a windows forwarder to collect windows event logs. I am forwarding this data to my linux receiver.
On the receiver, I have an index called "PCIEventLogs"
How do I configure this to store specific forwarded data to that index?
That is configured in the inputs.conf file on the forwarder. You probably have something like this there, unless you're doing it over WMI
[WinEventLog:Security]
disabled = 0
index = PCIEventLogs
This is where you specify what index to use. Note that the index must already exist on the receiving indexer(s).
See the documentation for inputs.conf and for Getting Data In
Hope this helps,
Kristian