Splunk heavy forwarders can filter and route event data based on various criteria, including event metadata like source, source type, or event patterns.
Routing can be configured through props.conf, transforms.conf, and outputs.conf files, with the ability to index data locally before forwarding or perform selective indexing.
Splunk's search processing language (SPL) supports Boolean operators: AND, OR, NOT, and XOR.
Exclusion searches using NOT tend to be less efficient than inclusive ones.