<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk forwarding selected logs to third party using Heavy Forwarder in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-forwarding-selected-logs-to-third-party-using-Heavy/m-p/752647#M23037</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/276234"&gt;@ws&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By setting the&amp;nbsp;&lt;SPAN&gt;defaultGroup in your [syslog] stanza you are telling Splunk to use this by default, therefore everything is being sent there.&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;defaultGroup = &amp;lt;comma-separated list&amp;gt;
* A comma-separated list of one or more target group names, specified later
in [syslog:&amp;lt;target_group&amp;gt;] stanzas.
* The forwarder sends all data to the specified groups.
* If you don't want to forward data automatically, don't configure this setting.
* Can be overridden by the '_SYSLOG_ROUTING' setting in the inputs.conf file,
which in turn can be overridden by a props.conf or transforms.conf modifier.&lt;/LI-CODE&gt;&lt;P&gt;You could either remove this, or change it to a non-existent value and restart, then it should only send there if your regex matches.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Sep 2025 11:26:05 GMT</pubDate>
    <dc:creator>livehybrid</dc:creator>
    <dc:date>2025-09-03T11:26:05Z</dc:date>
    <item>
      <title>Splunk forwarding selected logs to third party using Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-forwarding-selected-logs-to-third-party-using-Heavy/m-p/752624#M23036</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I’d appreciate it if someone could confirm whether my understanding is correct.&lt;/P&gt;&lt;P&gt;My objective is to forward incoming logs from specific devices (based on IP) via TCP:514 to a third-party system, while still allowing the Heavy Forwarder to forward all logs to the indexer.&lt;/P&gt;&lt;P&gt;At the moment, I’m unable to verify the raw logs directly. However, I was informed that the logs include the device’s own IP, which is why I configured a REGEX in transforms.conf to match the IP and forward only those logs to the third-party system.&lt;/P&gt;&lt;P&gt;With the current setup, though, all logs are being forwarded to the third-party destination instead of just the targeted IP.&lt;/P&gt;&lt;P&gt;Below are the configurations I applied across the three conf files.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#outputs.conf&lt;BR /&gt;[tcpout]&lt;BR /&gt;defaultgroup = indexer&lt;BR /&gt;indexAndForward = 0&lt;/P&gt;&lt;P&gt;[tcpout:indexer]&lt;BR /&gt;server = indexer_ip:8089&lt;/P&gt;&lt;P&gt;[syslog]&lt;BR /&gt;defaultGroup = thirdparty&lt;/P&gt;&lt;P&gt;[syslog:thirdparty]&lt;BR /&gt;server = thirdparty_ip:514&lt;/P&gt;&lt;P&gt;# props.conf&lt;BR /&gt;[source::tcp:514]&lt;BR /&gt;TRANSFORMS-route = route_to_thirdparty&lt;/P&gt;&lt;P&gt;# transforms.conf&lt;BR /&gt;[route_to_thirdparty]&lt;BR /&gt;REGEX = 192\.168\.68\.(68|74)&lt;BR /&gt;DEST_KEY = _SYSLOG_ROUTING&lt;BR /&gt;FORMAT = thirdparty&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 06:00:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-forwarding-selected-logs-to-third-party-using-Heavy/m-p/752624#M23036</guid>
      <dc:creator>ws</dc:creator>
      <dc:date>2025-09-03T06:00:08Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk forwarding selected logs to third party using Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-forwarding-selected-logs-to-third-party-using-Heavy/m-p/752647#M23037</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/276234"&gt;@ws&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By setting the&amp;nbsp;&lt;SPAN&gt;defaultGroup in your [syslog] stanza you are telling Splunk to use this by default, therefore everything is being sent there.&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;defaultGroup = &amp;lt;comma-separated list&amp;gt;
* A comma-separated list of one or more target group names, specified later
in [syslog:&amp;lt;target_group&amp;gt;] stanzas.
* The forwarder sends all data to the specified groups.
* If you don't want to forward data automatically, don't configure this setting.
* Can be overridden by the '_SYSLOG_ROUTING' setting in the inputs.conf file,
which in turn can be overridden by a props.conf or transforms.conf modifier.&lt;/LI-CODE&gt;&lt;P&gt;You could either remove this, or change it to a non-existent value and restart, then it should only send there if your regex matches.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 11:26:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-forwarding-selected-logs-to-third-party-using-Heavy/m-p/752647#M23037</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-09-03T11:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk forwarding selected logs to third party using Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-forwarding-selected-logs-to-third-party-using-Heavy/m-p/752662#M23042</link>
      <description>If I recall right there could be only one defaultGroup at time. It's not mater if it is under tcpout or syslog stanza, splunk use same for both.&lt;BR /&gt;&lt;BR /&gt;So if you want all goes to Splunk then use defaultGroup only in tcpout stanza and when you need to route some events into syslog use transforms with _SYSLOG_ROUTING.&lt;BR /&gt;&lt;BR /&gt;You should also remember that when you have configured more than one output targets which are used for same event, then if any of those stopped to receive events then all those stopped to work sooner or later. See more e.g. blockOnCloning etc.</description>
      <pubDate>Wed, 03 Sep 2025 13:41:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-forwarding-selected-logs-to-third-party-using-Heavy/m-p/752662#M23042</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2025-09-03T13:41:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk forwarding selected logs to third party using Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-forwarding-selected-logs-to-third-party-using-Heavy/m-p/752687#M23051</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170906"&gt;@livehybrid&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thanks for sharing.&lt;/P&gt;&lt;P&gt;This means the issue is caused by setting defaultGroup = thirdparty under [syslog].&lt;/P&gt;&lt;P&gt;In other words, all data is being sent to the third-party syslog destination by default. That’s why the settings in transforms.conf are being ignored, since the events are already routed to the third-party destination.&lt;/P&gt;&lt;P&gt;For my current situation, I believe the configurations in props.conf and transforms.conf can remain unchanged, and only outputs.conf needs to be updated.&lt;/P&gt;&lt;P&gt;#outputs.conf&lt;BR /&gt;[tcpout]&lt;BR /&gt;defaultgroup = indexer&lt;BR /&gt;indexAndForward = 0&lt;/P&gt;&lt;P&gt;[tcpout:indexer]&lt;BR /&gt;server = indexer_ip:8089&lt;/P&gt;&lt;P&gt;[syslog]&lt;BR /&gt;# defaultGroup = thirdparty&lt;/P&gt;&lt;P&gt;[syslog:thirdparty]&lt;BR /&gt;server = thirdparty_ip:514&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2025 03:04:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-forwarding-selected-logs-to-third-party-using-Heavy/m-p/752687#M23051</guid>
      <dc:creator>ws</dc:creator>
      <dc:date>2025-09-04T03:04:57Z</dc:date>
    </item>
  </channel>
</rss>

