Our scenario in new deployment: One indexer server (Windows) (+one separate Windows server as search head) One SC4S in Linux Two customers One customer with Windows / Linux servers, Win servers Security log data sent to Indexer with Universal forwarder installed to all servers, Linux servers sec log data sent to SC4S and then to indexer Second customer with Windows / Linux servers, ESX, NW devices etc. Win servers log data sent to indexer with Universal forwarder installed to all servers, Linux and other sec log data sent to SC4S and then to indexer. Both customers Universal forwarder data coming to the same default port 9997, SC4S sending to 514 Data from customers should be separated to two different indexes Only differentiating thing in these customers is the IP address segments where the data is coming in. I thought, that separating log data according to the sending devices ip- address would be a quite straight forward scenario, but so far I have tested with several options in props / transforms suggested in the community pages and read documentation, and none of the solutions have been successful, all data is deposited to the “main” index. If I put in indexes.conf defaultDB = <index name>, the logs are sent to this index, so the index itself is working and I can do searches in that index, but then all data would go to the same index… What then is the correct way to separate data into two different indexes according to the sending devices IP- address or better still according to IP segment? As I’m really new to Splunk, I do appreciate all advice if somebody here has done something similar and has insight on how to accomplish such a feat.
... View more