Getting Data In

Configuring inputs.conf to send data to specific Index

splunk_kk
Path Finder

I have a Splunk setup defined like: Universal Forwarder ---->Heavy Forwarder ------>Indexer

I need that all the logs hitting my Indexer should go to specific index. Which option is better:

1) Configuring index= new_index in Universal forwarder's input.conf
2) Configuring index= new_index in Heavy forwarder's input.conf
3) Configuring index= new_index in Indexer's input.conf

0 Karma

jtacy
Builder

Presonally, I would try to stick to setting this at the Universal Forwarder if possible. I don't think there's a significant processing cost to routing at the other tiers, but once you have a larger environment I think it would be a hassle to figure out why events are ending up in various indexes. I guess my philosophy is that if something can be done on the UF, that's probably the way to go.

That said, I probably wouldn't hesitate to select indexes on the HF or Indexer if I needed to make a change quickly and didn't have control of the UFs. If you ever want to select indexes based on something in the events themselves, such as the raw data, you're going to end up making that change on the HF or Indexer.

Good luck!

0 Karma
Get Updates on the Splunk Community!

Announcing General Availability of Splunk Incident Intelligence!

Digital transformation is real! Across industries, companies big and small are going through rapid digital ...

Splunk Training for All: Meet Aspiring Cybersecurity Analyst, Marc Alicea

Splunk Education believes in the value of training and certification in today’s rapidly-changing data-driven ...

The Splunk Success Framework: Your Guide to Successful Splunk Implementations

Splunk Lantern is a customer success center that provides advice from Splunk experts on valuable data ...