Hello,
In working with Splunk on an H.A. solution, we came up with the following. We would take all events into one indexer (A), then (A) would forward all of its events into indexer (B). We didn't want logs load balanced between both indexers, so we went with this setup.
I attempted to configure this by setting up receiving on (B) and configure forwarding on (A). However, when I do this, it looks like all data stops being collected on (A), and (B) never receives anything. I configured (A) to keep a copy of all logs to be forwarded, and I created a couple of the same indexes on (B) to test and make sure this would work.
Any help would be greatly appreciated, and thanks!
Alex
... View more