Splunk Enterprise

How to store 2 versions of an event into different indexes coming in on a TCP port?

New Member


I am working on a data stream coming into Splunk via a TCP port input, and have the requirement to store two versions of the data into two different indexes. One version will be exactly as it comes in, and the other version will have sensitive data masked before it is indexed.

I know how to do the data masking itself, and I know how to change index name at index time, but I can't seem to figure out how to put these two things together to be able to do what I need to do.

Does anyone out there know how to do this?

Thank you!

0 Karma


Hi Eric,

Did you read the docs about Data Cloning with Heavy Forwarders ? Don't know if this works, but did you try something like this ?

index = index1
sourcetype = original
disabled = 0

index = index2
sourcetype = parse_me
disabled = 0


0 Karma
Get Updates on the Splunk Community!

Splunk Training for All: Meet Aspiring Cybersecurity Analyst, Marc Alicea

Splunk Education believes in the value of training and certification in today’s rapidly-changing data-driven ...

Investigate Security and Threat Detection with VirusTotal and Splunk Integration

As security threats and their complexities surge, security analysts deal with increased challenges and ...

Observability Highlights | January 2023 Newsletter

 January 2023New Product Releases Splunk Network Explorer for Infrastructure MonitoringSplunk unveils Network ...