<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Changing Index for ActiveDirectory Sourcetype within Splunk_TA_windows in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Changing-Index-for-ActiveDirectory-Sourcetype-within-Splunk-TA/m-p/362645#M66112</link>
    <description>&lt;P&gt;When this sort of thing happens on our environment I use the btool feature to make sure the config loaded corresponds to what I am expecting.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;./splunk cmd btool inputs list
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You can add "--debug" at the end of the command to see what config file causes what&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;./splunk cmd btool inputs list --debug
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Write it to a file and start digging for the sourcetype you are looking for &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Ref: &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.0.1/Troubleshooting/Usebtooltotroubleshootconfigurations"&gt;https://docs.splunk.com/Documentation/Splunk/7.0.1/Troubleshooting/Usebtooltotroubleshootconfigurations&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 04 Jan 2018 21:50:50 GMT</pubDate>
    <dc:creator>gnoellbn</dc:creator>
    <dc:date>2018-01-04T21:50:50Z</dc:date>
    <item>
      <title>Changing Index for ActiveDirectory Sourcetype within Splunk_TA_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Changing-Index-for-ActiveDirectory-Sourcetype-within-Splunk-TA/m-p/362643#M66110</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;

&lt;P&gt;I'm using the Splunk_TA_windows app from Splunk to understand windows data. I've modified the app to pour data into the indexes of my choice and everything works fine (I've deployed the Splunk_TA_Windows to all the windows nodes and they are pouring data back as I've specified With the exception of one sourcetype.&lt;/P&gt;

&lt;P&gt;Sourcetype = ActiveDirectory &lt;/P&gt;

&lt;P&gt;This sourcetype pours it's data into the "main" index. I desire all of ActiveDirectory info to be poured into index = a&lt;/P&gt;

&lt;P&gt;As a test to determine how the data was being poured in, i temporarily disabled the Splunk_TA_windows app from it's server class. All of the "ActiveDirectory" info stopped being poured in as the Windows deployment app was dsiabled. Once I turned the app back on all the data began to pour back in (to the main index). &lt;/P&gt;

&lt;P&gt;I also noticed under "All Configurations" that the Sourcetype ActiveDirectory had 3 entries all showed the config type was props-extract &lt;/P&gt;

&lt;P&gt;I then Navigated over to $SPLUNK_HOME/etc/system/local/ to see if there was an entry made there that would cause this and I see nothing. I tried to create and entry and specify the index = a but it had no affect.&lt;/P&gt;

&lt;P&gt;It appears that whatever is causing the sourcetype = ActiveDirectory to pour it's data into main is directly tied o the Splunk_TA_windows app. I cannot locate where or how to modify it so that the Active Directory info goes to the index of my choosing. Thank you for your assistance.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:24:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Changing-Index-for-ActiveDirectory-Sourcetype-within-Splunk-TA/m-p/362643#M66110</guid>
      <dc:creator>Jarohnimo</dc:creator>
      <dc:date>2020-09-29T17:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: Changing Index for ActiveDirectory Sourcetype within Splunk_TA_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Changing-Index-for-ActiveDirectory-Sourcetype-within-Splunk-TA/m-p/362644#M66111</link>
      <description>&lt;P&gt;The &lt;CODE&gt;admon&lt;/CODE&gt; input included in the TA doesn't list a &lt;CODE&gt;sourcetype&lt;/CODE&gt; in its default inputs.conf (it's set in code somewhere), so it may not stand out when looking for it, but you can see your admon inputs thusly:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[splunk@indexer ~]$ ./bin/splunk btool inputs list admon
[admon://default]
disabled = 1
host = indexer
index = default
monitorSubtree = 1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This is what is in the default input listing in the TA:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[admon://default]
disabled = 1
monitorSubtree = 1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Wherever you have enabled &lt;CODE&gt;admon://default&lt;/CODE&gt; is where you should add &lt;CODE&gt;index = &amp;lt;new index&amp;gt;&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2018 21:42:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Changing-Index-for-ActiveDirectory-Sourcetype-within-Splunk-TA/m-p/362644#M66111</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2018-01-04T21:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: Changing Index for ActiveDirectory Sourcetype within Splunk_TA_windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Changing-Index-for-ActiveDirectory-Sourcetype-within-Splunk-TA/m-p/362645#M66112</link>
      <description>&lt;P&gt;When this sort of thing happens on our environment I use the btool feature to make sure the config loaded corresponds to what I am expecting.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;./splunk cmd btool inputs list
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You can add "--debug" at the end of the command to see what config file causes what&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;./splunk cmd btool inputs list --debug
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Write it to a file and start digging for the sourcetype you are looking for &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Ref: &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.0.1/Troubleshooting/Usebtooltotroubleshootconfigurations"&gt;https://docs.splunk.com/Documentation/Splunk/7.0.1/Troubleshooting/Usebtooltotroubleshootconfigurations&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2018 21:50:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Changing-Index-for-ActiveDirectory-Sourcetype-within-Splunk-TA/m-p/362645#M66112</guid>
      <dc:creator>gnoellbn</dc:creator>
      <dc:date>2018-01-04T21:50:50Z</dc:date>
    </item>
  </channel>
</rss>

