Developing for Splunk Platform

AppInspect - check_web_conf_expose_patterns_have_restmap_matches for EAI (Extensible Administration Interface)

anonymousStuden
Engager

My endpoint works perfectly fine and returned responses that I expect. However, when I ran my app through app inspect, I received the following:

FAILURE: web.conf found with a `pattern` exposed that does not
correspond to any `match` stanza in restmap.conf. Apps should only
expose endpoints that they define. Pattern: `/apiDomain/`. Please
remove or edit this stanza: [expose:apiDomain]. File:
default/web.conf Line Number: 3


My restmap.conf is as follows:

[admin:apiDomain]
match = /apiDomain
members = APIDomainHandler

[admin_external:APIDomainHandler]
handlertype = python
python.version = python3
handlerfile = APIDomainHandler.py
handleractions = list
handlerpersistentmode = true

And my web.conf is as follows:

[expose:apiDomain]
methods = GET
pattern = apiDomain

[expose:apiDomain_elements]
methods = GET
pattern = /apiDomain/*


default/web.conf Line Number: 3 is the pattern = apiDomain

I'm not sure what I'm missing here 
Labels (2)
0 Karma
1 Solution

anonymousStuden
Engager

Turns out I just needed to change my pattern from apiDomain to apiDomain/**, and the apiDomain_elements stanza is not needed.

View solution in original post

0 Karma

anonymousStuden
Engager

Turns out I just needed to change my pattern from apiDomain to apiDomain/**, and the apiDomain_elements stanza is not needed.

0 Karma
Get Updates on the Splunk Community!

Maximize the Value from Microsoft Defender with Splunk

 Watch NowJoin Splunk and Sens Consulting for this Security Edition Tech TalkWho should attend:  Security ...

This Week's Community Digest - Splunk Community Happenings [6.27.22]

Get the latest news and updates from the Splunk Community here! News From Splunk Answers ✍️ Splunk Answers is ...

Reminder! Splunk Love Promo: $25 Visa Gift Card for Your Honest SOAR Review With ...

We recently launched our first Splunk Love Special, and it's gone phenomenally well, so we're doing it again, ...