<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk app data index issue in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658281#M111358</link>
    <description>&lt;P&gt;Agreed - you need to have the index defined on the indexers.&amp;nbsp; Since the HF cooks the data when it comes across you need to have matching configuration at the receiving side.&amp;nbsp; Failure to do this will mean your data will route to the last chance index.&lt;/P&gt;&lt;P&gt;On the indexer check btool config for indexes.conf&lt;/P&gt;&lt;PRE&gt;[default]&lt;BR /&gt;lastChanceIndex = &amp;lt;index name&amp;gt;
* An index that receives events that are otherwise not associated
  with a valid index.
* If you do not specify a valid index with this setting, such events are
  dropped entirely.
* Routes the following kinds of events to the specified index:
  * events with a non-existent index specified at an input layer, like an
    invalid "index" setting in inputs.conf
  * events with a non-existent index computed at index-time, like an invalid
    _MetaData:Index value set from a "FORMAT" setting in transforms.conf
* You must set 'lastChanceIndex' to an existing, enabled index.
  Splunk software cannot start otherwise.
* If set to "default", then the default index specified by the
  'defaultDatabase' setting is used as a last chance index.
* Default: empty string&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 21 Sep 2023 13:30:24 GMT</pubDate>
    <dc:creator>dural_yyz</dc:creator>
    <dc:date>2023-09-21T13:30:24Z</dc:date>
    <item>
      <title>Splunk app data index issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658277#M111355</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;my app contains the index.conf which declares the index that is installed on the heavy forwarder and it is not installed on the indexer. The problem is that data does not land on the indexer&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 21 Sep 2023 13:11:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658277#M111355</guid>
      <dc:creator>yasit</dc:creator>
      <dc:date>2023-09-21T13:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk app data index issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658278#M111356</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/250636"&gt;@yasit&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you have two choices:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;install the app also on Indexers (I don't hint),&lt;/LI&gt;&lt;LI&gt;manually create the index on the Indexer.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;usually this is described in the instructions, which is the app?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 13:23:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658278#M111356</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-09-21T13:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk app data index issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658280#M111357</link>
      <description>&lt;P&gt;thanks &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what seems to be the issue? my understanding was that b&lt;SPAN&gt;y default if Splunk receives data for an index that doesn't exist, it will attempt to create the index dynamically.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 13:29:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658280#M111357</guid>
      <dc:creator>yasit</dc:creator>
      <dc:date>2023-09-21T13:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk app data index issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658281#M111358</link>
      <description>&lt;P&gt;Agreed - you need to have the index defined on the indexers.&amp;nbsp; Since the HF cooks the data when it comes across you need to have matching configuration at the receiving side.&amp;nbsp; Failure to do this will mean your data will route to the last chance index.&lt;/P&gt;&lt;P&gt;On the indexer check btool config for indexes.conf&lt;/P&gt;&lt;PRE&gt;[default]&lt;BR /&gt;lastChanceIndex = &amp;lt;index name&amp;gt;
* An index that receives events that are otherwise not associated
  with a valid index.
* If you do not specify a valid index with this setting, such events are
  dropped entirely.
* Routes the following kinds of events to the specified index:
  * events with a non-existent index specified at an input layer, like an
    invalid "index" setting in inputs.conf
  * events with a non-existent index computed at index-time, like an invalid
    _MetaData:Index value set from a "FORMAT" setting in transforms.conf
* You must set 'lastChanceIndex' to an existing, enabled index.
  Splunk software cannot start otherwise.
* If set to "default", then the default index specified by the
  'defaultDatabase' setting is used as a last chance index.
* Default: empty string&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 13:30:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658281#M111358</guid>
      <dc:creator>dural_yyz</dc:creator>
      <dc:date>2023-09-21T13:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk app data index issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658284#M111359</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/250636"&gt;@yasit&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;it isn't correct: if you are trying to send logs to a not existing index, you have a message (someting like this:&amp;nbsp;&lt;SPAN&gt;"unconfigured/disabled/deleted index=wineventlog with source="source::WinEventLog:System")&lt;/SPAN&gt;, but the index isn't automatically created.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 13:33:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658284#M111359</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-09-21T13:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk app data index issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658290#M111360</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/194981"&gt;@dural_yyz&lt;/a&gt;&amp;nbsp;Thanks&amp;nbsp;for the insight,&lt;BR /&gt;I've declared the index in my app's indexes.conf which is installed on the HF which essentially is being populated by scripted input.&amp;nbsp;&lt;BR /&gt;But is there a way around where I don't have to install my app on the indexers? And also can you please provide the reference where it mentions that I have to install my app in Indexer?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 13:37:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658290#M111360</guid>
      <dc:creator>yasit</dc:creator>
      <dc:date>2023-09-21T13:37:13Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk app data index issue</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658293#M111362</link>
      <description>&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.1.1/Indexer/Setupmultipleindexes" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.1.1/Indexer/Setupmultipleindexes&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You don't have to add your app to the indexers but you must define your index on the indexers.&amp;nbsp; A stand alone instance can define via GUI management, however if you have an indexing cluster you must use the CLI to edit an indexes.conf file which is pushed in the CM bundle to the IDX tier.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 13:41:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-app-data-index-issue/m-p/658293#M111362</guid>
      <dc:creator>dural_yyz</dc:creator>
      <dc:date>2023-09-21T13:41:25Z</dc:date>
    </item>
  </channel>
</rss>

