I have a Universal forwarder forwarding data from windows machine and I have created a receiver in the Splunk instance which resides in the Linux server. Instead of creating an input that takes data from the receiver, I want to forward the raw data received by the receiver to the indexer and get it indexed properly as we know Universal forwarder doesn't split the events in the data and just forwards the data to a receiver. I need to split the forwarded raw data into events and index it. Can someone throw some light on this
Thanks in advance
what is the main goal you try to solve?
The topology is that the universal forwarder sends data directly to the indexer where it get's indexed. if you have multiline logs the universal forwarder will send them line by line to the indexer, and the indexer will make sure they are re-constructed e.g. you can configure line merging by defining the source type. you might also split them.
Here are the configurations that I did
Universal forwarder output.conf ($SPLUNKHOME/etc/system/local) on windows
defaultGroup = 10.200.221.1589997
disabled = false
server = 10.200.221.158:9997
Heavy forwarder Input.conf ($SPLUNK_HOME/etc/system/local) on linux machine
Indexer Inputs.conf ($SPLUNK_HOME/etc/apps/search/local
BREAKONLYBEFORE = (.*)(INBOUND>>>>>|<<<<OUTBOUND)
NOBINARYCHECK = 1
SHOULDLINEMERGE = true
pulldowntype = 1
what I am trying to do is that I am forwarding a 4G network log from the windows machine to the splunk instance on the linux server and trying to index the data there. I have only a universal forwarder installed in the windows end but a full splunk instance on the linux end. Even after doing the above config the events are not getting split whatever changes done to the log is coming in as a single record. The Regex logic is fine if tested in isolation