Getting Data In

Unable to index mulesoft logs from Main index to another customized index.

Swkadam
New Member

Hi,

We have integrated Mulesoft with splunk and logs are sending to the heavy forwarder and indexing into "Main" index then forwarding to the indexers.

On Heavy forwarder we have created new index and assigned into the Http collector event but still logs are not indexing into the newly created index.

So do i need to create same new index on indexers as all indexers are in cluster mode.

0 Karma
1 Solution

ashpatel_splunk
Splunk Employee
Splunk Employee

The issue of the HEC events not being written to the newly created index on the HF is unrelated to the indexing tier. For the sake of clarity, can you confirm that you:

  1. Created a new index
  2. Edited the HEC from Data Inputs and in "Select Allowed Indexes" you removed Main and added your newly created index (i.e. - new_index)
  3. When you search index="new_index" you see no events? You tried running a curl test with the HEC token and there are still no events in there?

Remember, new created index may not be searched by default based on the index configuration and other RBAC setting.

View solution in original post

0 Karma

ashpatel_splunk
Splunk Employee
Splunk Employee

The issue of the HEC events not being written to the newly created index on the HF is unrelated to the indexing tier. For the sake of clarity, can you confirm that you:

  1. Created a new index
  2. Edited the HEC from Data Inputs and in "Select Allowed Indexes" you removed Main and added your newly created index (i.e. - new_index)
  3. When you search index="new_index" you see no events? You tried running a curl test with the HEC token and there are still no events in there?

Remember, new created index may not be searched by default based on the index configuration and other RBAC setting.

0 Karma

Richfez
SplunkTrust
SplunkTrust

EDIT: I moved this to a comment: ashpatel's answer is perfectly fine, so now that it's published it, he should get the credit here. 🙂 I didn't just delete the below because it could still be useful.

In fact, I think you need to do two additional things.

1) Create the index on your indexers. That's where the data is going, so that's where the indexes the data is going in to need to be.

2) Also you might need to edit the HTTP Event Collector and change it to allow it to index into that index. When you created it, if the index where these events are supposed to go you wouldn't have been able to pick it as an allowed index for that HEC to send events to, so you have to go back and reselect that again.

Then I think it should work.

Let us know how that goes!

-Rich

0 Karma

Swkadam
New Member

Thanks for your valuable reply.

It is working now.

0 Karma

Swkadam
New Member

Now we are getting mulesoft logs to newly created index on indexers but with other sourcetype also like syslogs . So we want to exclude sourcetype "syslogs" from newly created index.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...