Splunk Enterprise

How to store 2 versions of an event into different indexes coming in on a TCP port?

New Member


I am working on a data stream coming into Splunk via a TCP port input, and have the requirement to store two versions of the data into two different indexes. One version will be exactly as it comes in, and the other version will have sensitive data masked before it is indexed.

I know how to do the data masking itself, and I know how to change index name at index time, but I can't seem to figure out how to put these two things together to be able to do what I need to do.

Does anyone out there know how to do this?

Thank you!

0 Karma


Hi Eric,

Did you read the docs about Data Cloning with Heavy Forwarders ? Don't know if this works, but did you try something like this ?

index = index1
sourcetype = original
disabled = 0

index = index2
sourcetype = parse_me
disabled = 0


0 Karma
Get Updates on the Splunk Community!

Using Machine Learning for Hunting Security Threats

WATCH NOW Seeing the exponential hike in global cyber threat spectrum, organizations are now striving more for ...

Observability Newsletter Highlights | March 2023

 March 2023 | Check out the latest and greatestSplunk APM's New Tag Filter ExperienceSplunk APM has updated ...

Security Newsletter Updates | March 2023

 March 2023 | Check out the latest and greatestUnify Your Security Operations with Splunk Mission Control The ...