Getting Data In

Heavy Forwarder: How do I get traffic to a specific index on my indexer?

catsmeowor
Explorer

Hi Folks - testing the product out and trying to figure out this scenario.

Windows Server w/ Universal Forwarder --> Heavy Forwarder --> Specific Index on Indexer

Most of the above works and I have filtering based on specific events and account names are working too, the next step is getting traffic to a specific index on my indexer.

How do I do this? Referenced articles are not working.

On the indexer, I've created a new index 'winevents'

On props.conf

 [source::*:Security]
 TRANSFORMS-set = setnull,seclog

On my transforms.conf I've got:

 [seclog]
 REGEX = (?msi)(^EventCode=4634|4632).*(Account\sName:\t\tSUPER.)
 DEST_KEY = queue
 FORMAT = indexQueue

From what I understand 'format' should equal the new index name? FORMAT = winevents

That's not working.

0 Karma
1 Solution

catsmeowor
Explorer

Figured it out, inputs.conf on the indexer:

[WinEventLog]
index = winevents

At least I think I figured it out, still testing.

View solution in original post

0 Karma

harsmarvania57
Ultra Champion

Your props.conf and transforms.conf should be on HF, not on Indexer because parsing occurres on first full Splunk Enterprise instance from UF to Indexer.

0 Karma

mdsnmss
SplunkTrust
SplunkTrust

What you want to do is set the DEST_KEY to what value you want the FORMAT to change. Try:

 [seclog]
  REGEX = (?msi)(^EventCode=4634|4632).*(Account\sName:\t\tSUPER.)
  DEST_KEY = _MetaData:Index
  FORMAT = index::winevent
0 Karma

catsmeowor
Explorer

Unfortunately this does not work. No more events after making those changes, restarting everything.

Change it back to transforms.conf

[seclog]
REGEX = (?msi)(^EventCode=4634|4632).*(Account\sName:\t\tSUPER.)
DEST_KEY = queue
FORMAT = indexQueue

And specifying the index on the inputs.conf on the Windows host appears to work. Have not been able to figure out how to do it from the HF.

0 Karma

catsmeowor
Explorer

Figured it out, inputs.conf on the indexer:

[WinEventLog]
index = winevents

At least I think I figured it out, still testing.

0 Karma

mdsnmss
SplunkTrust
SplunkTrust

This will work if you want all WinEventLog events in the "winevents" index. The other method I posted will work to direct events on an event-by-event basis determined by the regex.

You can also put these settings at the HF level. Typically you want to apply settings as high up in the pipeline as possible. If using a UF you could specify index in inputs.conf but would have to use the props.conf/tranforms.conf at the indexer for my other solution. Let me know if you have any questions!

0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...