What is the difference between INDEX and INDEXER in SPLUNK
Hi @davidsplunk100 ,
index. : The repository for data in Splunk Enterprise. When Splunk Enterprise indexes raw event data, it transforms the data into searchable events. ... In general, the act of processing raw data and adding the processed data to an index.
https://docs.splunk.com/Splexicon:Index
indexer: A Splunk Enterprise instance that indexes data, transforming raw data into events and placing the results into an index. It also searches the indexed data in response to search requests.
https://docs.splunk.com/Splexicon:Indexer
Check below link for more information:
http://docs.splunk.com/Documentation/Splunk/7.0.1/Indexer/Aboutindexesandindexers
Thanks
Kamlesh
Hi @davidsplunk100 ,
index. : The repository for data in Splunk Enterprise. When Splunk Enterprise indexes raw event data, it transforms the data into searchable events. ... In general, the act of processing raw data and adding the processed data to an index.
https://docs.splunk.com/Splexicon:Index
indexer: A Splunk Enterprise instance that indexes data, transforming raw data into events and placing the results into an index. It also searches the indexed data in response to search requests.
https://docs.splunk.com/Splexicon:Indexer
Check below link for more information:
http://docs.splunk.com/Documentation/Splunk/7.0.1/Indexer/Aboutindexesandindexers
Thanks
Kamlesh
https://docs.splunk.com/Splexicon:Index
https://docs.splunk.com/Splexicon:Indexer
An indexer is a splunk instance, a separate machine - an index is a structure to store data on those indexers.