Hi,
We have splunk UF installed on devices to send log files to another forwarder, which sends the logs to indexer.
Splunk UF on Device --> Forwarder --> Indexer.
The configurations are:
Splunk UF on Device
inputs.conf
[monitor:<Path to the directory>]
disabled = false
host_regex = _(\d+\.\d+\.\d+\.\d+)
sourcetype = abc_xyz
index = my_index
crcSalt = <SOURCE>
outputs.conf
[tcpout]
disabled = false
defaultGroup = our_lwf
[tcpout:our_lwf]
server = <ip address of downward forwarder>:9998
Forwarder node
[splunktcp://:9998]
compressed=false
The issue is: We are getting duplicate log files. Same log files are sent twice. When we see the _indextime of log events, we see two different times. First set got indexed at X and the second set got indexed at X+Y minutes. The Y value varies from 11 to 13.
Note: On the device, the customers are compressing the log files and exporting them to another location every 15 minutes. If this compression and exporting feature is turned off on the devices then we are not seeing duplicate logs. If the compression and exporting is turned on we see duplicate logs.
Could you please let me know how to avoid duplicate log files getting into the system.
Thanks
Strive
... View more