So, the UF is sending data that hasn't really be parsed as much as metadata about source, soucetype, etc.. is sent with it. For example, the UF does not perform line breaking for events. It sends file content in chunks to the indexer.
The indexer is fully parsing the data, which includes line-breaking and index time extractions, this basically defines how individual events are identified and indexed. It takes the chunks of data, and the information about that data (the metadata sent with it from the forwarder) and runs the data through the parsing queue.
The search head does report time parsing, which is really just cosmetic, in that it can change how the event is displayed but does not change how the event was indexed.
So, to answer your question: Now when the logs are moving from Indexer to Search Head, will they still be adapting the same setting, what it was on forwarder, or it will take the setting of default?
No, the indexer will not use the settings from the forwarder. If a props.conf for this host, source, or sourcetype is not configured, then Splunk will use the default settings and attempt to learn this sourcetype.
The metadata sent by the forwarder is available (source, sourcetype, index) and will be used unless over-rode by props.conf defined on the indexer.
... View more