Splunk Search

Possible Bad Pointer in Index or Database?

dladkisson
New Member

After a system reboot for updates, SplunkWeb didn't not relaunch successfully after restart. After letting it sit for a few minutes SplunkWeb did finally launch however it appears that perhaps there was a corruption in the event database.

All I am feeding into it right now is Cisco IDS events using the Splunk_CiscoIPS plugin; latest versions of both the plugin and Splunk.

I cannot seem to find in the documentation a way to check the event database for errors nor figure out which database may even be affected.

If I start a query that overlaps the 15/20 minutes where the Splunkweb was down, the search hangs when it gets to that period. Searching outside the 'damaged' period returns results just fine.

Any suggestions would be greatly appreciated.

Tags (2)
0 Karma

dwaddle
SplunkTrust
SplunkTrust

It sounds like you may have a corrupted bucket. No real great answer here, except you probably would be best off to open a support case.

You could try quasi-randomly moving buckets out of your index directories. The dbinspect command might help you figure out which buckets match the time ranges of interest. Obviously, this approach may cause you to have data loss, where support might (if you're lucky) be able to avoid that.

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...