Hi nryagin, yeah, index and forward will do exactly that, in this case, indexes the events on the HF, and then sends it through its outputs to the indexer/sh, which also indexes it. If both splunk instances are using the same license, then this will be two instances of each event being indexed, which will then count towards your daily utilization.
To alleviate this, you could disable indexing on the search head, and set the HF up as your indexer, and remote search peer of the search head. This might not make total sense depending on the resource makeup of the HF box (splunk needs fast storage to be a good indexer, HFs are usually somewhat lightweight virtual machines).
Alternatively, you could just break out the indexer altogether, and have each role on a specific system, i.e. HF forwards to distinct indexer, and then SH searches remotely on the distinct indexer. More information on distributed search is here : https://docs.splunk.com/Documentation/Splunk/6.5.2/DistSearch/Whatisdistributedsearch
Please let me know if this answers your question! 😄
... View more