Getting Data In

Configuring inputs.conf to send data to specific Index

splunk_kk
Path Finder

I have a Splunk setup defined like: Universal Forwarder ---->Heavy Forwarder ------>Indexer

I need that all the logs hitting my Indexer should go to specific index. Which option is better:

1) Configuring index= new_index in Universal forwarder's input.conf
2) Configuring index= new_index in Heavy forwarder's input.conf
3) Configuring index= new_index in Indexer's input.conf

0 Karma

jtacy
Builder

Presonally, I would try to stick to setting this at the Universal Forwarder if possible. I don't think there's a significant processing cost to routing at the other tiers, but once you have a larger environment I think it would be a hassle to figure out why events are ending up in various indexes. I guess my philosophy is that if something can be done on the UF, that's probably the way to go.

That said, I probably wouldn't hesitate to select indexes on the HF or Indexer if I needed to make a change quickly and didn't have control of the UFs. If you ever want to select indexes based on something in the events themselves, such as the raw data, you're going to end up making that change on the HF or Indexer.

Good luck!

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...