<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: splunkd.log error message in Security</title>
    <link>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66171#M2180</link>
    <description>&lt;P&gt;Be sure to click &lt;CODE&gt;Accept&lt;/CODE&gt; to close the question.&lt;/P&gt;</description>
    <pubDate>Sun, 01 Jul 2018 04:03:01 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2018-07-01T04:03:01Z</dc:date>
    <item>
      <title>splunkd.log error message</title>
      <link>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66163#M2172</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I have this error message repeats twice every 5 seconds in splunkd.log:  "ERROR AuthenticationManagerLDAP - Could not find user: abc"  Where can I track down this misconfiguration?&lt;/P&gt;

&lt;P&gt;thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jun 2012 21:36:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66163#M2172</guid>
      <dc:creator>fuster_j</dc:creator>
      <dc:date>2012-06-01T21:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: splunkd.log error message</title>
      <link>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66164#M2173</link>
      <description>&lt;P&gt;When I have seen this in the past it is because there are entries in the metadata files which are referring to the user. If you search the local.meta files for the username, you should be able to find it. So on a Linux host:&lt;/P&gt;

&lt;P&gt;find /opt/splunk/ -name local.meta -exec grep abc {} \; -print&lt;/P&gt;

&lt;P&gt;HTH,&lt;/P&gt;

&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Sat, 02 Jun 2012 19:58:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66164#M2173</guid>
      <dc:creator>dshpritz</dc:creator>
      <dc:date>2012-06-02T19:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: splunkd.log error message</title>
      <link>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66165#M2174</link>
      <description>&lt;P&gt;Very Cool!  Thank you!  I used:&lt;BR /&gt;&lt;BR /&gt;
find /opt/splunk -name local.meta -exec grep "abc" {} \; -print&lt;BR /&gt;
It found the bad user ID.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Jun 2012 00:30:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66165#M2174</guid>
      <dc:creator>fuster_j</dc:creator>
      <dc:date>2012-06-03T00:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: splunkd.log error message</title>
      <link>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66166#M2175</link>
      <description>&lt;P&gt;ERROR AuthenticationManagerLDAP - Could not find user="nobody" with strategy="MyLDAPStrategy"&lt;BR /&gt;
ERROR UserManagerPro - Failed to get LDAP user="nobody" from any configured servers&lt;/P&gt;

&lt;P&gt;on RHEL I used this process successfully to remove the above errors that were spamming my splunkd.log: &lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;disabled 'learned' app (adds KO's with user='nobody' as owner)&lt;/LI&gt;
&lt;LI&gt;stop splunk service&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;look for zombie'd users:&lt;/P&gt;

&lt;P&gt;find /opt/splunk -name local.meta -exec grep -H 'nobody' {} \;^C    &lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;replace zombie'd users with 'admin'&lt;/P&gt;

&lt;P&gt;find /opt/splunk -name local.meta -exec sed -i 's/owner = nobody/owner = admin/g' {} \;&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;start splunk service&lt;/P&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 26 Jan 2016 18:39:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66166#M2175</guid>
      <dc:creator>tmarlette</dc:creator>
      <dc:date>2016-01-26T18:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: splunkd.log error message</title>
      <link>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66167#M2176</link>
      <description>&lt;P&gt;Thanks tmarlette ·&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2016 08:12:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66167#M2176</guid>
      <dc:creator>neelamsantosh</dc:creator>
      <dc:date>2016-05-03T08:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: splunkd.log error message</title>
      <link>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66168#M2177</link>
      <description>&lt;P&gt;Cool idea on converting nobody to admin!&lt;/P&gt;

&lt;P&gt;If you just want a list of what apps have a nobody in local.meta, try this:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;find /opt/splunk/ -name local.meta -exec grep nobody {} \; -print | grep / | sed 's/.*\/apps\///; s/\/metadata\/local.meta//'&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Aug 2017 17:11:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66168#M2177</guid>
      <dc:creator>wrangler2x</dc:creator>
      <dc:date>2017-08-16T17:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: splunkd.log error message</title>
      <link>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66169#M2178</link>
      <description>&lt;P&gt;Thanks for the find+sed, very helpful.&lt;BR /&gt;
But the error for me is &lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;Could not find user "system"&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;, and there is an &lt;EM&gt;owner = splunk-system-user&lt;/EM&gt; but no &lt;EM&gt;owner = system&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 01:46:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66169#M2178</guid>
      <dc:creator>andrewlorien</dc:creator>
      <dc:date>2018-06-29T01:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: splunkd.log error message</title>
      <link>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66170#M2179</link>
      <description>&lt;P&gt;Related -- this will find orphaned saved searches/alerts:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rest splunk_server=local /servicesNS/-/-/saved/searches add_orphan_field=yes count=0
| search orphan=1 disabled=0 is_scheduled=1
| eval status = if(disabled = 0, "enabled", "disabled")
| fields title eai:acl.owner eai:acl.app eai:acl.sharing orphan status is_scheduled cron_schedule next_scheduled_time next_scheduled_time actions
| rename title AS "search name" eai:acl.owner AS owner eai:acl.app AS app eai:acl.sharing AS sharing
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 29 Jun 2018 15:46:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66170#M2179</guid>
      <dc:creator>wrangler2x</dc:creator>
      <dc:date>2018-06-29T15:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: splunkd.log error message</title>
      <link>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66171#M2180</link>
      <description>&lt;P&gt;Be sure to click &lt;CODE&gt;Accept&lt;/CODE&gt; to close the question.&lt;/P&gt;</description>
      <pubDate>Sun, 01 Jul 2018 04:03:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66171#M2180</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2018-07-01T04:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: splunkd.log error message</title>
      <link>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66172#M2181</link>
      <description>&lt;P&gt;The solution to mine was to have all scheduled savedsearches to be owned by a service account / savedsearch runner account. &lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2019 01:26:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/splunkd-log-error-message/m-p/66172#M2181</guid>
      <dc:creator>morethanyell</dc:creator>
      <dc:date>2019-08-20T01:26:00Z</dc:date>
    </item>
  </channel>
</rss>

