Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BUG] Events of other apps get lost when a single app is using Index Routing with invalid index #295

Closed
JuergenSu opened this issue Sep 30, 2021 · 3 comments
Assignees
Labels
docs-update Update documentation
Milestone

Comments

@JuergenSu
Copy link

What happened
We have a foundation with 1000s of apps and a splunk nozzle reporting to the HEC of Splunk. Index Routing as described here https://github.com/cloudfoundry-community/splunk-firehose-nozzle#index-routing works for us. But if a single app specifies an environment variable with an illegal index, like SPLUNK_INDEX " " (empty) this events get included in to the post request sent to the HEC and the HEC discards the whole POST even if there are many other evnets in with no or correct index. This results in Loss of LogEvents transported to splunk, when a single application uses a wrong environment variable

What you expected to happen:
Logs should not be lost when this feature is used wrong, or at least the documentation should warn about this effect.

How to reproduce it (as minimally and precisely as possible):
have a CF foundation running some apps and have one app setting SPLUNK_INDEX to empty

Anything else we need to know?:
Add any other context about the problem here.

Environment:
This happens in every Version

@luckyj5
Copy link
Collaborator

luckyj5 commented Sep 30, 2021

@JuergenSu Thanks for reporting this issue. Yes per app index routing feature relies on having the correct index in place when using this feature. We will update the docs for the same to make it more clear.
Thank you!

@luckyj5 luckyj5 added the docs-update Update documentation label Sep 30, 2021
@luckyj5 luckyj5 added this to the v1.2.3 milestone Sep 30, 2021
@hvaghani221
Copy link
Collaborator

@JuergenSu I have added this as warning in the docs. You can refer #292
Thanks.

@JuergenSu
Copy link
Author

Thanks, i hope this helkps others because in large deployments with creative developers this can happen, For example when someone tries to avoid logs being sent to splunk and simply sets the index to something illegal but not using the F2S_DISABLE functionallity.

i guess this can be closed

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
docs-update Update documentation
Projects
None yet
Development

No branches or pull requests

3 participants