Splunk Enterprise

How to store 2 versions of an event into different indexes coming in on a TCP port?

New Member


I am working on a data stream coming into Splunk via a TCP port input, and have the requirement to store two versions of the data into two different indexes. One version will be exactly as it comes in, and the other version will have sensitive data masked before it is indexed.

I know how to do the data masking itself, and I know how to change index name at index time, but I can't seem to figure out how to put these two things together to be able to do what I need to do.

Does anyone out there know how to do this?

Thank you!

0 Karma


Hi Eric,

Did you read the docs about Data Cloning with Heavy Forwarders ? Don't know if this works, but did you try something like this ?

index = index1
sourcetype = original
disabled = 0

index = index2
sourcetype = parse_me
disabled = 0


0 Karma
Get Updates on the Splunk Community!

Splunk Life | Happy Pride Month!

Happy Pride Month, Splunk Community! 🌈 In the United States, as well as many countries around the ...

SplunkTrust | Where Are They Now - Michael Uschmann

The Background Five years ago, Splunk published several videos showcasing members of the SplunkTrust to share ...

Admin Your Splunk Cloud, Your Way

Join us to maximize different techniques to best tune Splunk Cloud. In this Tech Enablement, you will get ...