<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is forwardedindex.. only applicable for TCP connection? in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325404#M19549</link>
    <description>&lt;P&gt;Ok, so you haven’t done what the documentation says to do.  See if this document is easier to follow:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.0.3/Forwarding/Forwarddatatothird-partysystemsd"&gt;http://docs.splunk.com/Documentation/Splunk/7.0.3/Forwarding/Forwarddatatothird-partysystemsd&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Apr 2018 11:16:22 GMT</pubDate>
    <dc:creator>jkat54</dc:creator>
    <dc:date>2018-04-11T11:16:22Z</dc:date>
    <item>
      <title>Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325396#M19541</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I am using heavy forwarder to forward syslogs to a 3rd party syslog aggregator. I am trying to filter some of the forwarded events on heavy forwarder and noticed that it is already sending audit logs even if I blacklist all internal indexes. &lt;/P&gt;

&lt;P&gt;According to below outputs.conf it should not forward audit logs. After checking outputs.conf guide I have noticed forwardedindex..whitelist =  and forwardedindex..blacklist =  are only applicable under the global [tcpout] stanza. As it is an TCP based stanza I think it is not possible to filter UDP events. I need to make some additional regex-based filterings but I don't think it will not be possible. Is there any way to do this?&lt;/P&gt;

&lt;P&gt;outputs.conf&lt;/P&gt;

&lt;P&gt;[tcpout]&lt;BR /&gt;
maxQueueSize = auto&lt;BR /&gt;
forwardedindex.0.whitelist = .*&lt;BR /&gt;
forwardedindex.1.blacklist = _.*&lt;BR /&gt;
forwardedindex.2.blacklist = (_audit|_introspection|_telemetry)&lt;BR /&gt;
forwardedindex.filter.disable = false&lt;/P&gt;

&lt;P&gt;[syslog]&lt;BR /&gt;
defaultGroup = syslogGroup&lt;BR /&gt;
forwardedindex.0.whitelist = .*&lt;BR /&gt;
forwardedindex.1.blacklist = _.*&lt;BR /&gt;
forwardedindex.2.blacklist = (_audit|_introspection|_telemetry)&lt;BR /&gt;
forwardedindex.filter.disable = false&lt;/P&gt;

&lt;P&gt;[syslog:syslogGroup]&lt;BR /&gt;
server = 10.xx.x.xxx:514&lt;BR /&gt;
sendCookedData = false&lt;/P&gt;

&lt;P&gt;[syslog-server://10.xx.x.xxx:514]&lt;/P&gt;

&lt;P&gt;[tcpout]&lt;BR /&gt;
defaultGroup =&lt;BR /&gt;
indexAndForward = 1&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 18:57:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325396#M19541</guid>
      <dc:creator>cemiam</dc:creator>
      <dc:date>2020-09-29T18:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325397#M19542</link>
      <description>&lt;P&gt;Are you sure other outputs are not overriding your blacklist settings?&lt;/P&gt;

&lt;P&gt;Try this to see if another app is overriding:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;./splunk btool outputs list —debug
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I’m not sure why you have indexAndForward enabled, you didn’t mention keeping the data on the heavy forwarder so I’m not sure if you want to do that or not.&lt;/P&gt;

&lt;P&gt;As for applying your transformations to UDP data, yes you can do that. &lt;/P&gt;

&lt;P&gt;See this documentation: &lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.0.3/Forwarding/Routeandfilterdatad" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/7.0.3/Forwarding/Routeandfilterdatad&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Note you will be using _SYSLOG_ROUTING instead of _TCP_ROUTING.  There’s also _HTTP_ROUTING according to the link.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 18:55:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325397#M19542</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2020-09-29T18:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325398#M19543</link>
      <description>&lt;P&gt;Thanks for the reply. I have enabled indexandForward just to troubleshooting. I have disabled it. You can find the btool commands output below.  I couldn't find any overriding. &lt;/P&gt;

&lt;P&gt;/opt/splunk/etc/apps/SplunkForwarder/local/outputs.conf   [syslog]&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 defaultGroup = syslogGroup&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 forwardedindex.0.whitelist = .*&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 forwardedindex.1.blacklist = _.*&lt;BR /&gt;
/opt/splunk/etc/apps/SplunkForwarder/local/outputs.conf   forwardedindex.2.blacklist = (_audit|_introspection|_telemetry)&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 forwardedindex.filter.disable = false&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               maxEventSize = 1024&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               priority = &amp;lt;13&amp;gt;&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 sendCookedData = false&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               type = udp&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 [syslog-server://10.xx.x.xxx:514]&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 [syslog:syslogGroup]&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 server = 10.xx.x.xxx:514&lt;BR /&gt;
/opt/splunk/etc/apps/SplunkForwarder/local/outputs.conf   [tcpout]&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               ackTimeoutOnShutdown = 30&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               autoLBFrequency = 30&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               autoLBVolume = 0&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               blockOnCloning = true&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               blockWarnThreshold = 100&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-GCM-SHA384:AES128-GCM-SHA256:AES128-SHA256:ECDH-ECDSA-AES256-GCM-SHA384:ECDH-ECDSA-AES128-GCM-SHA256:ECDH-ECDSA-AES256-SHA384:ECDH-ECDSA-AES128-SHA256&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               compressed = false&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               connectionTimeout = 20&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 defaultGroup =&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               disabled = false&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               dropClonedEventsOnQueueFull = 5&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               dropEventsOnQueueFull = -1&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               ecdhCurves = prime256v1, secp384r1, secp521r1&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               forceTimebasedAutoLB = false&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 forwardedindex.0.whitelist = .*&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 forwardedindex.1.blacklist = _.*&lt;BR /&gt;
/opt/splunk/etc/apps/SplunkForwarder/local/outputs.conf   forwardedindex.2.blacklist = (_audit|_introspection|_telemetry)&lt;BR /&gt;
/opt/splunk/etc/apps/SplunkForwarder/default/outputs.conf forwardedindex.2.whitelist = (_audit|_introspection|_telemetry)&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 forwardedindex.filter.disable = false&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               heartbeatFrequency = 30&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 indexAndForward = 0&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               maxConnectionsPerIndexer = 2&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               maxFailuresPerInterval = 2&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 maxQueueSize = auto&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               readTimeout = 300&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               secsInFailureInterval = 1&lt;BR /&gt;
/opt/splunk/etc/system/local/outputs.conf                 sendCookedData = false&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               sslQuietShutdown = false&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               sslVersions = tls1.2&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               tcpSendBufSz = 0&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               useACK = false&lt;BR /&gt;
/opt/splunk/etc/system/default/outputs.conf               writeTimeout = 300&lt;BR /&gt;
[root@heavyforwarder bin]#&lt;/P&gt;

&lt;P&gt;For using transforms.conf I think I should index data. This is not something I should do. I have enabled indexandForward just for troubleshooting purposes.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 18:57:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325398#M19543</guid>
      <dc:creator>cemiam</dc:creator>
      <dc:date>2020-09-29T18:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325399#M19544</link>
      <description>&lt;P&gt;Can you post the inputs.conf too?&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2018 11:33:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325399#M19544</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2018-04-10T11:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325400#M19545</link>
      <description>&lt;P&gt;Somehow it doesn't allow me to upload inputs.conf output&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2018 12:06:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325400#M19545</guid>
      <dc:creator>cemiam</dc:creator>
      <dc:date>2018-04-10T12:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325401#M19546</link>
      <description>&lt;P&gt;I am not sure what is wrong with the post but although I have enough characters left it doesn't allow me to upload inputs.con btool command output. You can find the my inputs.conf output under /local directory.&lt;/P&gt;

&lt;P&gt;inputs.conf&lt;/P&gt;

&lt;P&gt;[default]&lt;BR /&gt;
host = heavyforwarder.dataserv.local&lt;/P&gt;

&lt;P&gt;[udp://515]&lt;BR /&gt;
sourcetype = syslog&lt;BR /&gt;
disabled = 0&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2018 12:10:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325401#M19546</guid>
      <dc:creator>cemiam</dc:creator>
      <dc:date>2018-04-10T12:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325402#M19547</link>
      <description>&lt;P&gt;Sorry I meant props.conf and transforms.conf related to this input.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2018 13:43:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325402#M19547</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2018-04-10T13:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325403#M19548</link>
      <description>&lt;P&gt;I have tried to send btool outputs but the character limitation doesn't allow me to do it. I have re-checked the props.conf and transforms.conf. Both are on the default. As I am planning send this data directly to a 3rd party I didn't make any configuration.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Apr 2018 07:34:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325403#M19548</guid>
      <dc:creator>cemiam</dc:creator>
      <dc:date>2018-04-11T07:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325404#M19549</link>
      <description>&lt;P&gt;Ok, so you haven’t done what the documentation says to do.  See if this document is easier to follow:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.0.3/Forwarding/Forwarddatatothird-partysystemsd"&gt;http://docs.splunk.com/Documentation/Splunk/7.0.3/Forwarding/Forwarddatatothird-partysystemsd&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Apr 2018 11:16:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325404#M19549</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2018-04-11T11:16:22Z</dc:date>
    </item>
    <item>
      <title>Re: Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325405#M19550</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I have just followed this document and now I am able to filter specific event with the help of regex. The problem is I am still having trouble to blacklisting audit logs. As they are not in common format it is hard to filter audit logs with regex.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Apr 2018 11:29:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325405#M19550</guid>
      <dc:creator>cemiam</dc:creator>
      <dc:date>2018-04-11T11:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325406#M19551</link>
      <description>&lt;P&gt;Did you try a regex that matches the index name?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Apr 2018 22:17:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325406#M19551</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2018-04-12T22:17:21Z</dc:date>
    </item>
    <item>
      <title>Re: Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325407#M19552</link>
      <description>&lt;P&gt;According guide regex helps to filter data but I think it can be filtered via hostname on props.conf.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Apr 2018 07:49:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325407#M19552</guid>
      <dc:creator>cemiam</dc:creator>
      <dc:date>2018-04-13T07:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: Is forwardedindex.. only applicable for TCP connection?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325408#M19553</link>
      <description>&lt;P&gt;Yeah you can do that.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Apr 2018 07:53:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-forwardedindex-only-applicable-for-TCP-connection/m-p/325408#M19553</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2018-04-13T07:53:50Z</dc:date>
    </item>
  </channel>
</rss>

