Activity Feed
- Got Karma for Re: Why are we getting error "Timed out waiting for peer XXX", but the search status=success?. 08-26-2023 08:56 AM
- Got Karma for Re: Monitoring console not working for user prievileges.. 08-30-2021 04:19 AM
- Got Karma for Re: Why are we getting error "Timed out waiting for peer XXX", but the search status=success?. 01-19-2021 06:37 AM
- Got Karma for Re: Why am I gettin the warning "Restricting results of the "rest" operator to the local instance because you do not have the "dispatch_rest_to_indexers" capability.". 10-07-2020 04:55 PM
- Got Karma for Re: How to troubleshoot error "idx=... Throttling indexer, too many tsidx files in bucket=..." on my distributed management console?. 07-15-2020 05:27 AM
- Karma Re: In Splunk Enterprise Security, how come the Incident review dashboard isn't returning events intermittently? for dkolekar_splunk. 06-05-2020 12:50 AM
- Karma Re: What are the basic troubleshooting steps in case of universal forwarder and heavy forwarder not forwarding data to Splunk? for dkolekar_splunk. 06-05-2020 12:50 AM
- Karma Re: Can you help me use an alert with a Splunk search query? for mbagali_splunk. 06-05-2020 12:50 AM
- Karma Re: How can we check if the SSL certificate and the private key matches or not? for dkolekar_splunk. 06-05-2020 12:50 AM
- Karma Re: How to - Custom alert action (passing arguments to custom scripts) for mbagali_splunk. 06-05-2020 12:50 AM
- Karma Re: How to - Custom alert action (passing arguments to custom scripts) for mbagali_splunk. 06-05-2020 12:50 AM
- Karma Re: Why are the buckets not rolling as per configuration under indexes.conf? for dkolekar_splunk. 06-05-2020 12:50 AM
- Karma Re: Why are there error messages in Splunkd: "ERROR ExecProcessor - message from "python...splunk_app_infrastructure\bin\em_entity_manager.py"? for dkolekar_splunk. 06-05-2020 12:50 AM
- Karma Re: What does the following Splunk health check warning mean? for mbagali_splunk. 06-05-2020 12:50 AM
- Karma Re: Episode page is not loading any data in ITSI app version 4.0.3 for mbagali_splunk. 06-05-2020 12:50 AM
- Karma Re: In Splunk, why am I getting the following error: "contains invalid UTF-8 encoding". for dkolekar_splunk. 06-05-2020 12:50 AM
- Karma Re: Unable to upload Threat Intelligence to ES despite Valid Directory for dkolekar_splunk. 06-05-2020 12:50 AM
- Karma Re: The maximum disk usage quota for this user has been reached. Use the Job Manager to delete some of your saved search results. for mbagali_splunk. 06-05-2020 12:50 AM
- Karma Re: appIcon.png not displayed in Splunk GUI for custom and default apps for dkolekar_splunk. 06-05-2020 12:50 AM
- Karma Re: Splunk add-on for O365 for mbagali_splunk. 06-05-2020 12:50 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
3 | |||
0 | |||
0 | |||
0 | |||
0 |
11-30-2019
09:24 AM
1 Karma
Kindly, check for which specific indexes and for which bucket directories it is giving the error.
Generally, whenever an index generates too many small tsidx files(more than 25) Splunk is not able to optimize all those files within the specified time period.
Kindly, run the below command against the specific directory to optimize it manually:-
splunk-optimize -d|--directory
Or you can make the below changes in Indexes.conf to fix the issue:-
indexes.conf
[default]
maxConcurrentOptimizes=25
maxRunningProcessGroups=12
processTrackerServiceInterval=0
Please go through the below documentation to have a better understanding of Splunk Optimization.
http://docs.splunk.com/Documentation/Splunk/latest/Indexer/Optimizeindexes
... View more
09-02-2019
08:07 AM
You need to provide in total three capabilities to view the monitoring console for user privileges.
1).admin_all_objests.
2).dispatch_rest_to_indexers.
3).edit_dist_peer.
The dispatch_rest_to_indexers capability will show the resource usage of each instance and edit_dist_peer will fix the instance unreachable error.
... View more
09-02-2019
07:47 AM
$job.earliestTime$ and $job.latestTime$ are both job information tokens and they do not work with Dashboards Scheduled PDF Delivery.If you schedule a PDF Report it works but with Dashboards Job information tokens doesn't work.
The above tokens gives information about specific search jobs and a Dashboard is made up of multiple Reports which in turn has multiple searches.So it cannot extract specific search job information. Because of which we are getting some weird results.
The below document clearly states Job information tokens are not supported for Scheduled PDF Delivery for Dashboards.
http://docs.splunk.com/Documentation/Splunk/6.5.2/Viz/DashboardPDFs#Tokens_available_for_email_notifications
... View more
09-02-2019
07:35 AM
2 Karma
$job.earliestTime$ and $job.latestTime$ are both job information tokens and they do not work with Dashboards Scheduled PDF Delivery.If you schedule a PDF Report it works but with Dashboards Job information tokens doesn't work.
The above tokens gives information about specific search jobs and a Dashboard is made up of multiple Reports which in turn has multiple searches.So it cannot extract specific search job information. Because of which we are getting some weird results.
The below document clearly states Job information tokens are not supported for Scheduled PDF Delivery for Dashboards.
http://docs.splunk.com/Documentation/Splunk/6.5.2/Viz/DashboardPDFs#Tokens_available_for_email_notifications
... View more
07-31-2019
09:41 PM
2 Karma
This error occurs when your Search Heads attempts to send a search job to a Search Peer (usually one of your Indexers) and the Indexer does not respond in within the default timeout period so the Search continues but without using that Indexer (which of course probably means that some of your events are not returned so your search is wrong). In my experience, the problem can often be cleared simply by restarting the Splunk instance on the Indexer in question but sometimes you need to dig deeper. In any case, something is keeping your Indexers so busy that it cannot reliably respond to search requests even though the Splunk instance is running. I am sure this kind of thing can also commonly be caused by misconfigured/misbehaving load-balancers or other identity/load-shifting equipment that is between your Search Head and your Indexer peers.
... View more
07-31-2019
09:36 PM
Generally, you will get the error If the account you are using to log in to the instance doesn't have the dispatch_rest_to_indexers capability.
You need to add the Dispatch_rest_to_indexers capability to the respective role or the user to make it work.
Or you can add it to the default stanza in authorize.conf so that everyone has that capability.
[default]
dispatch_rest_to_indexers = enabled
... View more
07-31-2019
09:35 PM
Since we upgraded from Splunk 6.5.3 to 7.0.3 we are getting the following warning:
REST Processor: Restricting results of the "rest" operator to the local instance because you do not have the "dispatch_rest_to_indexers" capability.
The relevant part of the search is
| rest splunk_server=local /services/authentication/current-context | fields username
According to the Search Reference , splunk_server=local should restrict the search to the search head - so this behavior is intentional. Why am I getting this warning? Can I somehow suppress it?
... View more
- Tags:
- splunk-enterprise
07-31-2019
09:27 PM
Kindly, check for which specific indexes and for which bucket directories it is giving the error.
Generally, whenever an index generates too many small tsidx files(more than 25) Splunk is not able to optimize all those files within the specified time period.
Kindly, run the below command against the specific directory to optimize it manually:-
splunk-optimize -d|--directory
Or you can make the below changes in Indexes.conf to fix the issue:-
indexes.conf
[default]
maxConcurrentOptimizes=25
maxRunningProcessGroups=12
processTrackerServiceInterval=0
Please go through the below documentation to have a better understanding of Splunk Optimization.
http://docs.splunk.com/Documentation/Splunk/latest/Indexer/Optimizeindexes
... View more
07-31-2019
09:26 PM
Hello,
I am getting these messages , what is the action upon this? The disk space is not even near half,that shouldn't be the cause. Any guidance will be greatly appreciated.
Thanks
... View more
- Tags:
- splunk-enterprise
07-31-2019
04:33 AM
If we have multiple users in our organization and do these users expire from the LDAP pre-cache?
... View more
- Tags:
- splunk-enterprise
06-26-2019
10:45 PM
1 Karma
Generally, you will get the error If the account you are using to log in to the instance doesn't have the dispatch_rest_to_indexers capability.
You need to add the Dispatch_rest_to_indexers capability to the respective role or the user to make it work.
Or you can add it to the default stanza in authorize.conf so that everyone has that capability.
[default]
dispatch_rest_to_indexers = enabled
... View more
06-26-2019
10:42 PM
If you are getting the error only for this specific directory you can run Splunk Optimization manually by the below command:-
splunk-optimize -d|--directory
But If you are getting multiple errors for different directories then It might be a bug.
In that case First, check what is the Splunk Version you are running on the Server.
It is a bug in older versions of Splunk(till 7.0.4.) and was fixed from 7.0.5.onwards.
If it is a lower version of Splunk you can upgrade Splunk to a higher version or you can make the below changes in your Indexes.conf to fix the issue.
indexes.conf
[default]
maxConcurrentOptimizes=25
maxRunningProcessGroups=12
processTrackerServiceInterval=0
... View more
06-26-2019
10:33 PM
Kindly, check for which specific indexes and for which bucket directories it is giving the error.
Generally, whenever an index generates too many small tsidx files(more than 25) Splunk is not able to optimize all those files within the specified time period.
Kindly, run the below command against the specific directory to optimize it manually:-
splunk-optimize -d|--directory
Or you can make the below changes in Indexes.conf to fix the issue:-
indexes.conf
[default]
maxConcurrentOptimizes=25
maxRunningProcessGroups=12
processTrackerServiceInterval=0
Please go through the below documentation to have a better understanding of Splunk Optimization.
http://docs.splunk.com/Documentation/Splunk/latest/Indexer/Optimizeindexes
... View more
05-20-2019
11:55 PM
3 Karma
Reports are emailing out fine. Dashboards can be exported to PDFs fine. However anytime we try to send a Dashboard PDF via email (be it a test email or scheduled) no email is sent and we see the following internal log entry. This was working for many months (years?) and suddenly stopped working. And is true for any/all dashboards we have created.
2019-04-25 12:00:00,368 -0400 WARNING sendemail:1398 - search results are empty, no email will be sent
... View more
05-05-2019
11:33 PM
As you told that you have disabled and deleted those two apps but still error shows that these two apps are causing accelerated data models. First check whether the searches are still coming from those two apps.if it still coming from those two apps it means the apps are not properly deleted or maybe the apps are present somewhere else in your environment which is also forwarding data from those two apps.
... View more
05-05-2019
11:15 PM
We recently upgraded the environment from 6.5 to 7.2 and ever since there is an upgradation in the environment we see that the rule fields are not getting extracted properly for Cisco message id 106100 but it is getting extracted for cisco message id 106123. We have defined the props and transforms still not able to extract the rule field for message id 106100. The rule field should be extracted by default but I see that some of the fields are not getting extracted by default but we need to extract it manually.
... View more
- Tags:
- splunk-enterprise
04-29-2019
04:33 AM
I am facing errors on that license master is low, what could be the issue?
My LC version is 6.5.1 and Search head is 7.2.1
... View more
04-16-2019
04:50 AM
1 Karma
For migrating the historical data from an index from old to new cluster you need to follow the below steps:-
Put CM in Maintenance mode before performing the below steps.
stop Splunk on the indexers (old existing cluster).
copy the original buckets (not replicated) manually from the existing cluster to a different location (e.g./tmp) on the same indexers.
create the index on the new indexer cluster master and push it to the new indexers.
update the GUID of the new indexer cluster peers in the old indexers bucket id. (i.e. replace the current indexers GUID with the new indexers GUID at the end of the bucket name)
place the buckets copied from the existing setup to the new cluster with respective bucket numbers. (bucket numbers should not conflict with each other)
start indexers for the bucket to replicate to the other indexers.
To get the GUID of the indexers, you can either use CM's indexer clustering page in the GUI and expand the indexer details in peers tab or navigate to the CLI of the respective indexers and check $SPLUNK_HOME/etc/instance.cfg file.
... View more
04-08-2019
11:00 PM
2 Karma
You need to provide in total three capabilities to view the monitoring console for user privileges.
1).admin_all_objests.
2).dispatch_rest_to_indexers.
3).edit_dist_peer.
The dispatch_rest_to_indexers capability will show the resource usage of each instance and edit_dist_peer will fix the instance unreachable error.
... View more
03-31-2019
10:36 PM
1 Karma
In Splunk 7.2.x opening an external link in a new tab from the app navigation bar works. Example data/ui/nav/default.xml file including a link to the Splunk Developer Portal:
Splunk Developer Portal
Please Note:-It works only for 7.2.x versions and above.Tried it with lower versions(for ex.6.5.x) of splunk and it's not working.For 7.2.x it works for pre-defined apps as well as custom apps also.
... View more
03-28-2019
11:30 PM
I am facing an issue, where there are two timestamps in the events, and I want Splunk to detect the first time stamp, not the second one. How can I get it done? here is a sample event
Mar 20 06:27:29 10.214.14.249 id=EQSONICWALL sn=C0EAE4FC9962 time="2019-03-20 05:27:29" fw=10.214.14.249 pri=6 c=1024 m=537
... View more
03-28-2019
10:32 PM
I have a source logfile /var/splunk/log/user.log.I am sending the data from UF--->HF-->Indexer. And I am seeing the data is getting duplicated. Data is getting duplicated only from this source. I checked splunkd.log and got the below error:-
WatchedFile - File too small to check seekcrc, probably truncated. Will re-read entire file
Please let me know what can be done to fix the issue?
... View more
- Tags:
- splunk-enterprise