Getting Data In

Forwarding data for only selected hosts

brianm1002
New Member

I have one splunk indexer that receives data from a variety of hosts. I want to also forward the data coming in from about 3-4 of these hosts to a second Splunk indexer, while also indexing the data on the first indexer. All the hosts I want to forward happen to be coming in through syslog, but that might not always be true.

This is what I have on the first indexer:

In props.conf:

[host::host1.xxxxxxx.xxx] 
TRANSFORMS-routing=InfoSecRouting 
[host::host2.xxxxxxx.xxx] 
TRANSFORMS-routing=InfoSecRouting 
[host::host3.xxxxxxx.xxx] 
TRANSFORMS-routing=InfoSecRouting 
[host::host4.xxxxxxx.xxx] 
TRANSFORMS-routing=InfoSecRouting 
[host::host5.xxxxxxx.xxx] 
TRANSFORMS-routing=InfoSecRouting 

In transforms.conf:

[InfoSecRouting] 
REGEX = . 
DEST_KEY=_TCP_ROUTING 
FORMAT=InfoSecGroup

In outputs.conf:

[tcpout] 
defaultGroup=none 
indexAndForward=true 

[tcpout:InfoSecGroup] 
server=10.110.70.183:9002

On the second indexer, I have the following in inputs.conf:

[default]
host = indexer2

[splunktcp://9002]
index = operations

This doesn't seem to be working. The first indexer is still indexing these hosts, but nothing is being forwarded to the second indexer. I came up with these settings based on the forwarding and routing section of the Splunk manual.

Thanks, Brian

Tags (1)
0 Karma

hazekamp
Builder

This could be an order of operations issue with respect to when the value of "host" is being set. Out of curiousity are you using Splunk forwarders? If "host" is also being set via index-time TRANSFORMS property (which is often the case for direct syslog input), you may have to specify your TRANSFORMS to run on your source input and specify the values of "host" in the REGEX.

For instance:

## props.conf
[source::udp:514]
TRANSFORMS-routing_for_syslog = InfoSecRouting_syslog

## transforms.conf
[InfoSecRouting_syslog] 
REGEX = \w{3}\s+\d+\s+\d{2}:\d{2}\d{2}\s+(host1.xxxxxxx.xxx|host2.xxxxxxx.xxx)
DEST_KEY=_TCP_ROUTING 
FORMAT=InfoSecGroup

## For reference this is the $SPLUNK_HOME/etc/system/default/transforms.conf for syslog-host
[syslog-host]
DEST_KEY = MetaData:Host
REGEX = :\d\d\s+(?:\d+\s+|(?:user|daemon|local.?)\.\w+\s+)*\[?(\w[\w\.\-]{2,})\]?\s
FORMAT = host::$1
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...