Does anyone have troubleshooting steps on how to troubleshoot parse time or index time related issue. The use case sourcetype override or sending thing to nullQueue and filter.
The reason for asking is that I didn't see anything in the internal logs or search string that was obvious to me. Any tips can help... Thanks in advance
Hi
As @chaker said, 1st you must understand the data path from source to indexer(s) and also is there separate search head(s). After that you can start to look if your configurations are on correct places.
My own "best practices" are always do onboarding on my test instance (e.g. in workstation). Just take sample data and use own test app and index on that for easier remove events after tries and copy configurations to the correct production nodes. On your own instance use just
If you are getting data into with HEC then this is little bit different process based on which kind of events vs. raw you are getting in.
For trouble shooting "splunk btool" is the tool to check that you have correct configuration in use. If/when you are troubleshooting SH side configurations remember to add --app and --user if/when needed as the precedence is different than in index phase!
Summary:
Some useful links:
r. Ismo
Hi
As @chaker said, 1st you must understand the data path from source to indexer(s) and also is there separate search head(s). After that you can start to look if your configurations are on correct places.
My own "best practices" are always do onboarding on my test instance (e.g. in workstation). Just take sample data and use own test app and index on that for easier remove events after tries and copy configurations to the correct production nodes. On your own instance use just
If you are getting data into with HEC then this is little bit different process based on which kind of events vs. raw you are getting in.
For trouble shooting "splunk btool" is the tool to check that you have correct configuration in use. If/when you are troubleshooting SH side configurations remember to add --app and --user if/when needed as the precedence is different than in index phase!
Summary:
Some useful links:
r. Ismo
First understand your Splunk topology. Are there heavy forwarders (HF) involved?
Index time instructions will only apply on a HF or Indexer, and events will only be parsed once. So if an event is parsed by and HF and sent to an indexer, instructions for that event on the indexer will be ignored.
Try to use btool to track down the entries in props.conf. That should give you a good place to start.
/opt/splunk/bin/splunk btool props list <sourcetype> --debug
Hi @youngsuh,
the best solution to troubleshoot parsing is to manually upload a file in the "Add data" GUI feature and use it to search the correct parsing rule.
In Splunk internal logs there isn't any usegul information because a not correct parsing rule isn't an error for Splunk abut only for you the read the events.
Ciao.
Giuseppe