Monitoring Splunk

How to repair Data input index to normal state

KJ10
Loves-to-Learn

How I can repair Data input index to normal state.
I created Data input as per my Technical Add on , for some reason I changed my index in inputs.conf to new index, which apparently doesnt work in Splunk 9.3 though I created new index from UI. Later I changed my index to original but somehow that Data input stuck and never executing at all.
I tried reinstalling my TA app and splunk restart multiple time but no luck and no error in spulnkd.log. Same scenario happened at client end.
Can anybody please guide me for this repair or what can be RCA though we reverted all inputs to normal.

Labels (2)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @KJ10 ,

could you share your inputs.conf file?

anyway, in general, the option index=<your_index> in inputs.conf, if the index is really existent, shouldn't have any issue.

Didi you checked if the index is really existent and if you gave the correct grants to it?

Anyway, if you restore the original index name in inputs.conf, and restart Splunk on the Forwarder, logs should arrive to the original index; did you restarted the UF after restored the original index?

Are you using a Deployment Server to deploy configurations on UF or did you manually modified them?

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Manual Instrumentation with Splunk Observability Cloud: The What and Why

If you've ever worked with distributed systems, you’ve likely felt the pain of a frontend throwing errors, ...

Full-Stack Security in Financial Services: AppDynamics, Cisco Secure Application, and ...

Full-Stack Security in Financial Services: AppDynamics, Cisco Secure Application, and Splunk ES Protecting a ...

It's Customer Success Time at .conf25

Hello Splunkers,   Ready for .conf25? The customer success and experience team is and can’t wait to see you ...