Splunk IT Service Intelligence

ITSI "suite_redirect" page fails to load with shows "oops" for non admin users

yannK
Splunk Employee
Splunk Employee
 
ITSI menus send the users to "suite_redirect" page, that also fails to load with shows "oops" for non admin users Usually after an ITSI Upgrade (observed on 4.9 and later), on a Search-Head cluster.
Labels (2)
0 Karma
1 Solution

yannK
Splunk Employee
Splunk Employee

see known bug ITSI-20605

Check the roles: are all the users impacted or are only non-admin roles impacted?
Check the web_service.log in index=_internal, do you see errors like that or different views or management views.

 

An unknown view name "homeview" is referenced in the navigation definition for "itsi".

 



Check the app metadata permissions for those views.
Example: in ../etc/apps/itsi/metadata/local.meta, look for the view "homeview"
Check which roles have read and write permissions, If only the admin can, there it's the root cause.
Compare to the default permissions in ../etc/apps/itsi/metadata/default.meta

A corrupted permissions stanza will look like that, you see no roles in the brackets :

 

 

access = delete : [ ], read : [ ], write : [ ]

 

 

 

Resolution

Clean the .../etc/apps/itsi/metadata/local.meta
Removed all stanzas impacted, as they were conflicting with the definition is default.meta
If the instance is a Search-head cluster, you will have to fix is on all Search Head, and restart.

View solution in original post

0 Karma

yannK
Splunk Employee
Splunk Employee

see known bug ITSI-20605

Check the roles: are all the users impacted or are only non-admin roles impacted?
Check the web_service.log in index=_internal, do you see errors like that or different views or management views.

 

An unknown view name "homeview" is referenced in the navigation definition for "itsi".

 



Check the app metadata permissions for those views.
Example: in ../etc/apps/itsi/metadata/local.meta, look for the view "homeview"
Check which roles have read and write permissions, If only the admin can, there it's the root cause.
Compare to the default permissions in ../etc/apps/itsi/metadata/default.meta

A corrupted permissions stanza will look like that, you see no roles in the brackets :

 

 

access = delete : [ ], read : [ ], write : [ ]

 

 

 

Resolution

Clean the .../etc/apps/itsi/metadata/local.meta
Removed all stanzas impacted, as they were conflicting with the definition is default.meta
If the instance is a Search-head cluster, you will have to fix is on all Search Head, and restart.

0 Karma
Get Updates on the Splunk Community!

Improve Your Security Posture

Watch NowImprove Your Security PostureCustomers are at the center of everything we do at Splunk and security ...

Maximize the Value from Microsoft Defender with Splunk

 Watch NowJoin Splunk and Sens Consulting for this Security Edition Tech TalkWho should attend:  Security ...

This Week's Community Digest - Splunk Community Happenings [6.27.22]

Get the latest news and updates from the Splunk Community here! News From Splunk Answers ✍️ Splunk Answers is ...