We are planning to use TCP syslog to send logs from networks devices to heavy forwarders and from there to indexers. Heavy forwarders will be load balanced using external load balancer and Heavy forwarder will be configured to send logs to two indexers using internal splunk forwarder load balancing in outputs.conf.
Considering this, logs from same network device will be divided between Heavy forwarders and hence indexers as well. Are there any challenges in this setup which i am not aware of? We will be using ES app for event corelation and security alerting.
Will Search Head be able to corelate events coming from same source but being stored onto different indexers. Is there something which i need to take care of?