Splunk Enterprise

Parsing warning in spec files (python.version) (ConfReplicationThread)

ak_sky
Engager

Hi,

I am getting errors similar to below for 5 inputs.conf.spec stanzas:

 

03-22-2023 09:03:52.484 +0000 WARN  SpecFiles [45520 ConfReplicationThread] - Found parameter "python.version" inside "/apps/splunk/splunk/etc/apps/splunk_app_soar/README/inputs.conf.spec", scheme "audit://", but this parameter will be ignored as it does not contain the correct sequence of characters (a parameter name must match the regex "([0-9a-zA-Z][0-9a-zA-Z_-]*)").

 

The 5 stanzas are:

  • Splunk_TA_paloalto/README/inputs.conf.spec", scheme "iot_security://"
  • TA-tenable/README/inputs.conf.spec", scheme "tenable_io://"
  • TA-tenable/README/inputs.conf.spec", scheme "tenable_securitycenter://"
  • TA-tenable/README/inputs.conf.spec", scheme "tenable_securitycenter_mobile://"
  • splunk_app_soar/README/inputs.conf.spec", scheme "audit://"

The definitions for python.version in each stanza are:

  • Splunk_TA_paloalto/README/inputs.conf.spec: [] python.version = python3
  • TA-tenable/README/inputs.conf.spec: [tenable_io://] python.version = python3
  • TA-tenable/README/inputs.conf.spec: [tenable_securitycenter://] python.version = python3
  • TA-tenable/README/inputs.conf.spec: [tenable_securitycenter_mobile://] python.version = python3
  • splunk_app_soar/README/inputs.conf.spec: [audit://] python.version = {default|python|python2|python3}

All the definitions for python.version seem to match the regex requirement stated in the warning.

Also I have other spec files with python.version defined in the same way that are not causing these messages:

  • system/README/inputs.conf.spec: [script://] python.version = {default|python|python2|python3}
  • TA-MS-AAD/README/alert_actions.conf.spec: [dismiss_azure_alert] python.version = python3

Anyone have any ideas how to stop these messages being generated?

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Those definitions look normal to me, but "python.version" does fail to match the regex since the regex does not allow for the dot character.  I can't explain the inconsistent behavior.

Submit a Support request for the SOAR app.  Contact the developers of the other apps.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...