All Apps and Add-ons

Modifying the All Indexed Data dashboard for custom indices

dlofstrom
Path Finder

I have customized the Windows App to send perfmon and windows events to separate indices (named perfmon and winevents, respectively). As such, the "All Indexed Data" dashboard at the bottom of the Windows_App_Info ("Overview") page no longer renders the information correctly.

I dove into the XML and tried to re-arrange the search, but had little success with this. It seems to be bound to constraints I am not terribly familiar with (a bit of a novice here). For example, the search to render the "Sources" column is: | metadata type=sources (eventtype="windows_performance" OR eventtype="windows_events") (...etc...). The relevant eventtype definitions have been updated to specify the relevant custom index, and work in normal searches, though not in this particular lookup. On top of that, I can retrieve data if I specify index=*, though this is not exactly what I want. If I change the search to specify (index=winevents OR index=perfmon) in place of the eventtypes parameters, it produces 0 results.

Am I only allowed to specify one index here? Has anyone had any luck getting this to dashboard to render using custom indices?

0 Karma
1 Solution

dlofstrom
Path Finder

I inadvertently figured out the answer to my original question, as well as my follow up.

I can get the search results to appear, as well as the drill-down hyperlinks to work for this dashboard if I include the custom indices as default indices under the relevant user roles.

View solution in original post

dlofstrom
Path Finder

I inadvertently figured out the answer to my original question, as well as my follow up.

I can get the search results to appear, as well as the drill-down hyperlinks to work for this dashboard if I include the custom indices as default indices under the relevant user roles.

skylasam_splunk
Splunk Employee
Splunk Employee

A couple of things to check -
1. Does this user role have access to the new indices that you've setup?
2. Have you modified eventtypes.conf stanzas to include the relevant indices? For example -
[windows_performance]
search = index=perfmon (sourcetype="powershell" OR sourcetype="Perfmon:" OR sourcetype="WMI:Perfmon")
3. You can specify more than one index to target in the searches.

dlofstrom
Path Finder

I think I got the search term correct. There seems to be a restriction where you can't specify OR with indices? I modified the search from:

| metadata type=sources (eventtype="windows_performance" OR eventtype="windows_events")

to:

| metadata type=sources (index=perfmon OR index=winevents)

...which returned nothing. After your post, I tried this instead:

| metadata type=sources index=perfmon index=winevents

...which does work; now I'm getting results. However drilling into the content omits any references to the index, so there must be something else I need to customize to include this.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...