Splunk® Enterprise

Forwarding Data

Route and filter data

You can use heavy forwarders to filter and route event data to Splunk instances. You can also perform selective indexing and forwarding, where you index some data locally and forward the data that you have not indexed to a separate indexer.

For information on routing data to non-Splunk systems, see Forward data to third-party systems.

For information on performing selective indexing and forwarding, see Perform selective indexing and forwarding later in this topic.

Routing and filtering capabilities of forwarders

Heavy forwarders can filter and route data to specific receivers based on source, source type, or patterns in the events themselves. For example, you can send all data from one group of machines to one indexer and all data from a second group of machines to a second indexer. Heavy forwarders can also look inside the events and filter or route accordingly. For example, you could use a heavy forwarder to inspect WMI event codes to filter or route Windows events. This topic describes a number of typical routing scenarios.

Besides routing to receivers, heavy forwarders can also filter and route data to specific queues, or discard the data altogether by routing to the null queue.

Only heavy forwarders can route or filter all data based on events. Universal and light forwarders cannot inspect individual events except in the case of extracting fields with structured data. They can still forward data based on a host, source, or source type. They can also route based on the stanza for a data input, as described below, in the subtopic, Route inputs to specific indexers based on the data input. Some input types can filter out data types while acquiring them.

A simple illustration of a forwarder routing data to three indexers follows:

30 admin13 forwardreceive-datarouting 60.png

Configure routing

You can configure routing only on a heavy forwarder.

  1. Determine the criteria to use for routing by answering the following questions:
    • How will you identify categories of events?
    • Where will you route the events?
  2. On the Splunk instance that does the routing, open a shell or command prompt.
  3. Edit $SPLUNK_HOME/etc/system/local/props.conf to add a TRANSFORMS-routing setting to determine routing based on event metadata. For example:
    [<spec>]
    TRANSFORMS-routing=<transforms_stanza_name>
    

    In this props.conf stanza:

    • <spec> can be:
      • <sourcetype>, the source type of an event
      • host::<host>, where <host> is the host for an event
      • source::<source>, where <source> is the source for an event
    • If you have multiple TRANSFORMS attributes, use a unique name for each. For example: "TRANSFORMS-routing1", "TRANSFORMS-routing2", and so on.
    • <transforms_stanza_name> must be unique.

    Use the <transforms_stanza_name> specified here when creating an entry in transforms.conf

    Examples later in this topic show how to use this syntax.

  4. Save the file.
  5. Edit $SPLUNK_HOME/etc/system/local/transforms.conf to specify target groups and set additional criteria for routing based on event patterns. For example:
    [<transforms_stanza_name>]
    REGEX=<routing_criteria>
    DEST_KEY=_TCP_ROUTING
    FORMAT=<target_group>,<target_group>,....
    

    In this transforms.conf stanza:

    • <transforms_stanza_name> must match the name you defined in props.conf.
    • In <routing_criteria>, enter the regular expression rules that determine which events get routed. This line is required. Use "REGEX = ." if you don't need additional filtering beyond the metadata specified in props.conf.
    • DEST_KEY should be set to _TCP_ROUTING to send events via TCP. It can also be set to _SYSLOG_ROUTING.
    • Set FORMAT to a <target_group> that matches a target group name you defined in outputs.conf. If you specify more than one target group, use commas to separate them. A comma separated list clones events to multiple target groups.

    Examples later in this topic show how to use this syntax.

  6. Edit $SPLUNK_HOME/etc/system/local/outputs.conf to define the target groups for the routed data. For example:
    [tcpout:<target_group>]
    server=<ip>:<port>
    

    In this outputs.conf stanza:

    • You can set <target_group> to match the name you specified in transforms.conf.
    • You can set the IP address and port to match the receiving server.

    The use cases described in this topic follow this pattern.

Filter and route event data to target groups

In this example, a heavy forwarder filters three types of events and routes them to different target groups. The forwarder filters and routes according to these criteria:

  • Events with a source type of "syslog" to a load-balanced target group
  • Events containing the word "error" to a second target group
  • All other events to a default target group
  1. On the instance that is to do the routing, open a command or shell prompt.
  2. Edit $SPLUNK_HOME/etc/system/local/props.conf in $SPLUNK_HOME/etc/system/local to set two TRANSFORMS-routing settings: one for syslog data and a default for all other data.
    [default]
    TRANSFORMS-routing=errorRouting
    
    [syslog]
    TRANSFORMS-routing=syslogRouting
    
  3. Edit $SPLUNK_HOME/etc/system/local/transforms.conf to set the routing rules for each routing transform.
    [errorRouting]
    REGEX=error
    DEST_KEY=_TCP_ROUTING
    FORMAT=errorGroup
    
    [syslogRouting]
    REGEX=.
    DEST_KEY=_TCP_ROUTING
    FORMAT=syslogGroup
    

    In this example, if a syslog event contains the word "error", it routes to syslogGroup, not errorGroup. This is due to the settings you previously specified in props.conf. Those settings dictated that all syslog events should be filtered through the syslogRouting transform, while all non-syslog (default) events should be filtered through the errorRouting transform. Therefore, only non-syslog events get inspected for errors.

  4. Edit $SPLUNK_HOME/etc/system/local/outputs.conf to define the target groups.
    [tcpout]
    defaultGroup=everythingElseGroup
    
    [tcpout:syslogGroup]
    server=10.1.1.197:9996, 10.1.1.198:9997
    
    [tcpout:errorGroup]
    server=10.1.1.200:9999
    
    [tcpout:everythingElseGroup]
    server=10.1.1.250:6666
    

    syslogGroup and errorGroup receive events according to the rules specified in transforms.conf. All other events get routed to the default group, everythingElseGroup.

Replicate a subset of data to a third-party system

This example uses data filtering to route two data streams. It forwards:

  • All the data, in cooked form, to a Splunk Enterprise indexer (10.1.12.1:9997)
  • A replicated subset of the data, in raw form, to a third-party machine (10.1.12.2:1234)

The example sends both streams as TCP. To send the second stream as syslog data, first route the data through an indexer.

  1. On the Splunk instance that is to do the routing, open a command or shell prompt.
  2. Edit $SPLUNK_HOME/etc/system/local/props.conf.
    [syslog]
    TRANSFORMS-routing = routeAll, routeSubset
    
  3. Edit $SPLUNK_HOME/etc/system/local/transforms.conf and add the following text:
    [routeAll]
    REGEX=(.)
    DEST_KEY=_TCP_ROUTING
    FORMAT=Everything
    
    [routeSubset]
    REGEX=(SYSTEM|CONFIG|THREAT)
    DEST_KEY=_TCP_ROUTING
    FORMAT=Subsidiary,Everything
    
  4. Edit $SPLUNK_HOME/etc/system/local/outputs.conf and add the following text:
    [tcpout]
    defaultGroup=nothing
    
    [tcpout:Everything]
    disabled=false
    server=10.1.12.1:9997
    
    [tcpout:Subsidiary]
    disabled=false
    sendCookedData=false
    server=10.1.12.2:1234
    
  5. Restart Splunk software.

Filter event data and send to queues

Although similar to forwarder-based routing, queue routing can be performed by an indexer, as well as a heavy forwarder. It does not use the outputs.conf file, only props.conf and transforms.conf.

You can eliminate unwanted data by routing it to the nullQueue, the Splunk equivalent of the Unix /dev/null device. When you filter out data in this way, the data is not forwarded and doesn't count toward your indexing volume.

See Caveats for routing and filtering structured data later in this topic.

Discard specific events and keep the rest

This example discards all sshd events in /var/log/messages by sending them to nullQueue:

  1. In props.conf, set the TRANSFORMS-null attribute:
    [source::/var/log/messages]
    TRANSFORMS-null= setnull
    
  2. Create a corresponding stanza in transforms.conf. Set DEST_KEY to "queue" and FORMAT to "nullQueue":
    [setnull]
    REGEX = \[sshd\]
    DEST_KEY = queue
    FORMAT = nullQueue
    
  3. Restart Splunk Enterprise.

Keep specific events and discard the rest

Keeping only some events and discarding the rest requires two transforms. In this scenario, which is opposite of the previous, the setnull transform routes all events to nullQueue while the setparsing transform selects the sshd events and sends them on to indexQueue.

As with other index-time field extractions, processing of transforms happens in the order that you specify them, from left to right. The key difference is the order in which you specify the stanzas. In this example, the setnull stanza must appear first in the list. This is because if you set it last, it matches all events and sends them to the nullQueue, and as it is the last transform, it effectively throws all of the events away, even those that previously matched the setparsing stanza.

When you set the setnull transform first, it matches all events and tags them to be sent to the nullQueue. The setparsing transform then follows, and tags events that match [sshd] to go to the indexQueue. The result is that the events that contain [sshd] get passed on, while all other events get dropped.

  1. Edit props.conf and add the following:
    [source::/var/log/messages]
    TRANSFORMS-set= setnull,setparsing
    
  2. Edit transforms.conf and add the following:
    [setnull]
    REGEX = .
    DEST_KEY = queue
    FORMAT = nullQueue
    
    [setparsing]
    REGEX = \[sshd\]
    DEST_KEY = queue
    FORMAT = indexQueue
    
  3. Restart Splunk Enterprise.

Filter WMI and Event Log events

You can filter WinEventLog events directly on a universal forwarder. The [WinEventLog] stanzas in inputs.conf offer direct filtering of EventCodes before data leaves the forwarder. See Create advanced filters with 'whitelist' and 'blacklist' in the Getting Data In manual.

To filter event codes on WMI events, use the [WMI:WinEventLog:] source type stanza in props.conf on the parsing node (heavy forwarder or indexer,) and define a regular expression in transforms.conf to remove specific strings that match.

The following example uses regular expressions to filter out the two event codes (592, and 593) from the WMI:WinEventLog:Security channel:

  1. Determine which node is the receiver for events coming from the forwarder that can parse data. This will be a heavy forwarder or an indexer.
  2. Edit the receiver props.conf and add a transformation to a WMI:WinEventLog channel:
    [WMI:WinEventLog:Security]
    TRANSFORMS-wmi=wminull
    
  3. Edit the receiver transforms.conf and define a regular expression for the data you want to filter out:
    [wminull]
    REGEX=(?m)^EventCode=(592|593)
    DEST_KEY=queue
    FORMAT=nullQueue
    
  4. Restart Splunk Enterprise services on the receiver.

Filter data by target index

Forwarders have a forwardedindex filter that lets you specify whether data gets forwarded, based on the target index. For example, if you have one data input whose events you have specified to go to the "index1" index, and another whose events you want to go to the "index2" index, you can use the filter to forward only the data targeted to the index1 index, while ignoring the data that is to go to the index2 index.

The forwardedindex filter uses deny lists and allow lists to specify the filtering. For information on setting up multiple indexes, see Create custom indexes in the Managing Indexers and Clusters of Indexers manual.

You can only use the forwardedindex filter under the global [tcpout] stanza. The filter does not work if you specify it under any other outputs.conf stanza.

You can use the forwardedindex.<n>.whitelist|blacklist settings in outputs.conf to specify the data that should be forwarded. You accomplish this by configuring the settings with regular expressions that filter the target indexes.

Default behavior

By default, the forwarder sends data targeted for all external indexes, including the default index and any indexes that you have created. For internal indexes, the forwarder sends data targeted for the following indexes

  • _audit
  • _configtracker
  • _internal
  • _introspection
  • _telemetry

In most deployments, you do not need to override the default settings.

For more information on how to include and exclude indexes, see the outputs.conf specification file For more information on default and custom outputs.conf files and their locations, see Types of outputs.conf files.

Forward all external and internal index data

If you want to forward all internal index data, as well as all external data, you can override the default forwardedindex filter attributes:

#Forward everything
[tcpout]
forwardedindex.0.whitelist = .*
# disable these
forwardedindex.1.blacklist =
forwardedindex.2.whitelist =

Forward data for a single index only

If you want to forward only the data targeted for a single index (for example, as specified in inputs.conf), and drop any data that is not a target for that index, configure outputs.conf in this way:

[tcpout]
#Disable the current filters from the defaults outputs.conf
forwardedindex.0.whitelist = 
forwardedindex.1.blacklist =
forwardedindex.2.whitelist =

#Forward data for the "myindex" index
forwardedindex.0.whitelist = myindex

This first disables all filters from the default outputs.conf file. It then sets the filter for your own index. Be sure to start the filter numbering with 0: forwardedindex.0.

Note: If you've set other filters in another copy of outputs.conf on your system, you must disable those as well.

You can use the CLI btools command to ensure that there aren't any other filters located in other outputs.conf files on your system:

splunk cmd btool outputs list tcpout

This command returns the content of the tcpout stanza, after all versions of the configuration file have been combined.

Use the forwardedindex attributes with local indexing

On a heavy forwarder, you can index locally. To do that, you must set the indexAndForward attribute to "true". Otherwise, the forwarder just forwards your data and does not save it on the forwarder. On the other hand, the forwardedindex attributes only filter forwarded data; they do not filter any data that gets saved to the local index.

In a nutshell, local indexing and forwarder filtering are entirely separate operations, which do not coordinate with each other. This can have unexpected implications when you perform filtering:

  • If you set indexAndForward to "true" and then filter out some data through forwardedindex attributes, the forwarder does not forward the excluded data, but it does still index the data.
  • If you set indexAndForward to "false" (no local indexing) and then filter out some data, the forwarder drops the filtered data entirely (because it neither forwards nor indexes the filtered data.)

Route inputs to specific indexers based on the data input

In this scenario, you use inputs.conf and outputs.conf to route data to specific indexers, based on the data's input. Universal and light forwarders can perform this kind of routing.

Here's an example that shows how this works.

  1. In outputs.conf, create stanzas for each receiving indexer:
    [tcpout:systemGroup]
    server=server1:9997
    
    [tcpout:applicationGroup]
    server=server2:9997
    
  2. In inputs.conf, specify _TCP_ROUTING to set the stanza in outputs.conf that each input should use for routing:
    [monitor://.../file1.log]
    _TCP_ROUTING = systemGroup
    
    [monitor://.../file2.log]
    _TCP_ROUTING = applicationGroup
    

The forwarder routes data from file1.log to server1 and data from file2.log to server2.

Perform selective indexing and forwarding

You can index and store data locally, as well as forward the data onwards to a receiving indexer. There are two ways to do this:

  • Index all the data before forwarding it. To do this, enable the indexAndForward attribute in outputs.conf.
  • Index a subset of the data before forwarding it or other data. This is called selective indexing. With selective indexing, you can index some of the data locally and then forward it on to a receiving indexer. Alternatively, you can choose to forward only the data that you don't index locally.

Do not enable the indexAndForward attribute in the [tcpout] stanza if you also plan to enable selective indexing.

Configure selective indexing

To use selective indexing, you must modify both inputs.conf and outputs.conf.

In this example, the presence of the [IndexAndForward] stanza, including the index and selectiveIndexing settings, turns on selective indexing for the forwarder. It enables local indexing for any input (specified in inputs.conf) that has the _INDEX_AND_FORWARD_ROUTING setting.

The presence of the _INDEX_AND_FORWARD_ROUTING setting in inputs.conf tells the heavy forwarder to index that input locally. You can configure the setting to any string value you want. The forwarder looks for the setting itself.

Use the entire [indexAndForward] stanza exactly as shown here.

  1. In outputs.conf, add the [indexAndForward] stanza:
    [indexAndForward]
    index=true
    selectiveIndexing=true 
    

    Note: This is a global stanza, and only needs to appear once in outputs.conf.

  2. Include the target group stanzas for each set of receiving indexers:
    [tcpout:<target_group>]
    server = <ip address>:<port>, <ip address>:<port>, ...
    ... 
    

    The forwarder uses the named <target_group> in inputs.conf to route the inputs.

  3. In inputs.conf, add the _INDEX_AND_FORWARD_ROUTING setting to the stanzas of each input that you want to index locally:
    [input_stanza]
    _INDEX_AND_FORWARD_ROUTING=<any_string>
    ...
    
  4. Add the _TCP_ROUTING setting to the stanzas of each input that you want to forward:
    [input_stanza]
    _TCP_ROUTING=<target_group>
    ...
    

    The <target_group> is the name used in outputs.conf to specify the target group of receiving indexers.

The next several sections show how to use selective indexing in a variety of scenarios.

Index one input locally and then forward the remaining inputs

In this example, the forwarder indexes data from one input locally but does not forward it. It also forwards data from two other inputs but does not index those inputs locally.

  1. In outputs.conf, create these stanzas:
    [tcpout]
    defaultGroup=noforward
    disabled=false
    
    [indexAndForward]
    index=true
    selectiveIndexing=true
    
    [tcpout:indexerB_9997]
    server = indexerB:9997
    
    [tcpout:indexerC_9997]
    server = indexerC:9997
    

    Since the defaultGroup is set to the non-existent group "noforward" (meaning that there is no defaultGroup), the forwarder only forwards data that has been routed to explicit target groups in inputs.conf. It drops all other data.

  2. In inputs.conf, create these stanzas:
    [monitor:///mydata/source1.log]
    _INDEX_AND_FORWARD_ROUTING=local
    
    [monitor:///mydata/source2.log]
    _TCP_ROUTING=indexerB_9997
    
    [monitor:///mydata/source3.log]
    _TCP_ROUTING=indexerC_9997
    

The result is that the forwarder:

  • Indexes the source1.log data locally but does not forward it (because there is no explicit routing in its input stanza and there is no default group in outputs.conf)
  • Forwards the source2.log data to indexerB but does not index it locally
  • Forwards the source3.log data to indexerC but does not index it locally

Index one input locally and then forward all inputs

This example is nearly identical to the previous one. The difference is that here, you index just one input locally, but then you forward all inputs, including the one you've indexed locally.

  1. In outputs.conf, create these stanzas:
    [tcpout]
    defaultGroup=noforward
    disabled=false
    
    [indexAndForward]
    index=true
    selectiveIndexing=true
    
    [tcpout:indexerB_9997]
    server = indexerB:9997
    
    [tcpout:indexerC_9997]
    server = indexerC:9997
    
  2. In inputs.conf, create these stanzas:
    [monitor:///mydata/source1.log]
    _INDEX_AND_FORWARD_ROUTING=local
    _TCP_ROUTING=indexerB_9997
    
    [monitor:///mydata/source2.log]
    _TCP_ROUTING=indexerB_9997
    
    [monitor:///mydata/source3.log]
    _TCP_ROUTING=indexerC_9997
    

The only difference from the previous example is that here, you have specified the _TCP_ROUTING attribute for the input that you are indexing locally. The forwarder routes both source1.log and source2.log to the indexerB_9997 target group, but it only locally indexes the data from source1.log.

Another way to index one input locally and then forward all inputs

You can achieve the same result as in the previous example by setting the defaultGroup to a real target group.

  1. In outputs.conf, create these stanzas:
    [tcpout]
    defaultGroup=indexerB_9997
    disabled=false
    
    [indexAndForward]
    index=true
    selectiveIndexing=true
    
    [tcpout:indexerB_9997]
    server = indexerB:9997
    
    [tcpout:indexerC_9997]
    server = indexerC:9997
    

    This outputs.conf sets the defaultGroup to indexerB_9997.

  2. In inputs.conf, create these stanzas:
    [monitor:///mydata/source1.log]
    _INDEX_AND_FORWARD_ROUTING=local
    
    [monitor:///mydata/source2.log]
    _TCP_ROUTING=indexerB_9997
    
    [monitor:///mydata/source3.log]
    _TCP_ROUTING=indexerC_9997
    

Even though you have not set up an explicit routing for source1.log, the forwarder still sends it to the indexerB_9997 target group, since outputs.conf specifies that group as the defaultGroup.

Selective indexing and internal logs

After you enable selective indexing in outputs.conf, the forwarder only indexes those inputs with the _INDEX_AND_FORWARD_ROUTING setting. This applies to the internal logs in the /var/log/splunk directory (specified in the default etc/system/default/inputs.conf). By default, the forwarder does not index those logs. If you want to index them, you must add their input stanza to your local inputs.conf file (which takes precedence over the default file) and include the _INDEX_AND_FORWARD_ROUTING attribute:

[monitor://$SPLUNK_HOME/var/log/splunk]
index = _internal
_INDEX_AND_FORWARD_ROUTING=local

Caveats for routing and filtering structured data

Splunk software does not parse structured data that has been forwarded to an indexer

When you forward structured data to an indexer, Splunk software does not parse this data after it arrives at the indexer, even if you have configured props.conf on that indexer with INDEXED_EXTRACTIONS and its associated attributes. Forwarded data skips the following queues on the indexer, which precludes any parsing of that data on the indexer:

  • parsing
  • aggregation
  • typing

The forwarded data must arrive at the indexer already parsed. To achieve this, you must also set up props.conf on the forwarder that sends the data. This includes configuration of INDEXED_EXTRACTIONS and any other parsing, filtering, anonymizing, and routing rules. Universal forwarders are capable of performing these tasks solely for structured data. See Forward data extracted from header files.

Last modified on 02 March, 2022
Protect against loss of in-flight data   Forward data to third-party systems

This documentation applies to the following versions of Splunk® Enterprise: 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.0.4, 9.0.5, 9.0.6, 9.0.7, 9.0.8, 9.0.9, 9.0.10, 9.1.0, 9.1.1, 9.1.2, 9.1.3, 9.1.4, 9.1.5, 9.1.6, 9.1.7, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4, 9.3.0, 9.3.1, 9.3.2, 9.4.0


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters