Hi Kelly, The following error is normal when no proxy is enabled or no proxy credentials are saved in TA-Zscaler_CIM: PersistentScript - From {/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/TA-Zsca...
See more...
Hi Kelly, The following error is normal when no proxy is enabled or no proxy credentials are saved in TA-Zscaler_CIM: PersistentScript - From {/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/TA-Zscaler_CIM/bin/TA_Zscaler_CIM_rh_settings.py persistent}: solnlib.credentials.CredentialNotExistException: Failed to get password of realm=__REST_CREDENTIAL__#TA-Zscaler_CIM#configs/conf-ta_zscaler_cim_settings, user=proxy. The error is likely normal in TA-sailpoint_identitynow-auditevent-add-on and TA-trendmicrocloudappsecurity for the same reason. The read timeout error in TA-trendmicrocloudappsecurity is caused by the Trend Micro /v1/siem/security_events endpoint not returning an HTTP response within 5 minutes, the default read timeout inherited by TA-trendmicrocloudappsecurity when it calls the Splunk Add-on Builder helper.send_http_request() method with timeout=None. The timeout value is not configurable, but TA-trendmicrocloudappsecurity/bin/input_module_tmcas_detection_logs.py could be modified to use a longer timeout value: response = helper.send_http_request( url, "GET", parameters=params, payload=None, headers=headers, cookies=None, verify=True, cert=None, timeout=(None, 60), use_proxy=use_proxy, ) However, this change should be made by Trend Micro, preferably by making the connect and read timeout values fully configurable. Explosions in splunkd.log events can often be caused by failures in modular or scripted inputs, where a script logs a message before a process fails, Splunk immediately restarts the process, and the cycle repeats ad infinitum. Your screenshots don't necessarily point to that, but you may get closer to a cause with: index=_internal source=*splunkd.log* host=*splunkdcloud* | cluster showcount=t | sort 10 - cluster_count | table cluster_count _raw If you don't see anything with a cluster_count of the expected magnitude, remove host=*splunkdcloud* from the search. Change the sort limit from 10 to 0 to show all results.