Known issues - Splunk Documentation (2023)

Splunk® Enterprise

Release Notes

Download manual as PDF



  1. Documentation
  2. Splunk® Enterprise
  3. Release Notes
  4. Known issues

Download topic as PDF

The following are issues and workarounds for this version of Splunk Enterprise.

Issues are listed in all relevant sections. Some issues appear more than once.

Refer to System requirements in the Installation Manual for a list of supported platforms and architectures.

For a list of deprecated features and platforms, refer to Deprecated features and removed features in this manual.

Authentication and authorization issues

Date filedIssue numberDescription
2022-04-19SPL-222791, SPL-207068SPL - list_introspection capability is not properly applied to some search REST endpoints

Workaround:
Permissions are now properly applied to the following REST endpoints:

•/services/server/introspection/search/dispatch•/services/server/introspection/search/distributed

Splunk software now displays errors when users with insufficient privileges access these endpoints using the 'rest' command or the HTTP API. To resolve these errors, add the list_introspection capability to the authorize.conf file for the role of the user that requires the endpoint information. Adding this capability to your roles ensures that searches and integrations continue to work properly.

2020-12-04SPL-198284Crash in PrecacheUsersThread when max_searches_per_process is set lower than default

Workaround:
Set limits.conf back to default, by removing any override of max_searches_per_process.

For example:

[search]max_searches_per_process=1

to

[search]
2018-04-13SPL-153403After running the "clean userdata" command, admin is unable to login with msg "No users exist. Please set up a new user."

Workaround:
Create a $SPLUNK_HOME/etc/system/local/user-seed.conf and restart Splunk

[user_info]
PASSWORD = <yourpassword>


2016-07-26SPL-125052Sole Admin can demote his/herself to Power without path of recovery in GUI

Workaround:
Through the command line, you can open notepad and modify the password file to regain 'Admin' status.

Upgrade issues

Date filedIssue numberDescription
2020-11-09SPL-197140UF failed to start on Solaris 11.3 with error: "symbol in6addr_any: referenced symbol not found"

Workaround:
1. Do not upgrade past Splunk 8.0.5 on Solaris 11.3

(Video) Splunk Tutorial For Beginners | Troubleshooting Splunk

OR2. Upgrade to Solaris 11.4

2020-08-31SPL-194426External search command chunked v2 python SDK fails with multibyte result data under python 3.

Workaround:
Apps may experience this issue if they: implement a custom search command using the Splunk Enterprise SDK for Python between versions 1.6.5 and 1.6.13; are executed by Splunk Enterprise or Splunk Cloud using Python 3; and are sent events with multi-byte characters.

App developers whose apps implement a custom search command using a version of the Splunk Enterprise SDK for Python must update to version 1.6.14 or higher and release new versions of their apps.

Splunk Enterprise and Splunk Cloud administrators who are using apps impacted by this issue must update to app versions that use the Splunk Enterprise SDK for Python version 1.6.14 or higher. If this is not possible, administrators are encouraged to either: allow these apps to be executed using Python 2; or cease usage of impacted apps until updated versions are available.

2020-07-10SPL-191850The .deb installation package will fail if dpkg version doesn't support an .xz compressed control file.

Workaround:
Update dpkg to version 1.17.6 or later.

2018-04-13SPL-153403After running the "clean userdata" command, admin is unable to login with msg "No users exist. Please set up a new user."

Workaround:
Create a $SPLUNK_HOME/etc/system/local/user-seed.conf and restart Splunk

[user_info]
PASSWORD = <yourpassword>


2017-03-13SPL-138647Possible compatibility issues between new 6.6 and later default sslVersions, cipherSuites and external services, e.g. e-mail, LDAP

Workaround:
If security is not a significant concern, simply revert back to the 6.5.x SSL/TLS defaults, e.g. for e-mail, add to $SPLUNK_HOME/etc/system/local/alert_actions.conf

[email]
sslVersions = *,-ssl2
cipherSuite = TLSv1+HIGH:TLSv1.2+HIGH:@STRENGTH


To configure LDAP with the same settings used by e-mail alerts:$SPLUNK_HOME/etc/openldap/ldap.conf

TLS_PROTOCOL_MIN 3.1
TLS_CIPHER_SUITE TLSv1+HIGH:TLSv1.2+HIGH:@STRENGTH


To completely revert the LDAP configuration to the 6.5.x SSL/TLS defaults, comment out TLS_PROTOCOL_MIN and TLS_CIPHER_SUITE

If you would like to retain the more secure 6.6.x defaults, but prefer to add an exception for your less secure external services, follow the procedure below:

1. To determine what sslVersions and cipherSuites are supported by a server, run splunk cmd openssl s_client -connect hostname:port | awk '/Protocol/ || /Cipher/ || /Verify/'.

The example below is for a Postfix SMTP server:

eserv@indexer01:~$ splunk cmd openssl s_client -connect smtp-server01:465 | awk '/Protocol/ || /Cipher/ || /Verify/'
depth=1 C = US, O = Example Customer, OU = IT, CN = Example Customer IT CA, emailAddress = customer@example.org verify error:num=19:self signed certificate in certificate chain New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA

 Protocol: TLSv1 Cipher: DHE-RSA-AES256-SHA Verify return code: 19 (self signed certificate in certificate chain)

2. Check the OpenSSL output for Protocol and Cipher. In the example above, Protocol = TLSv1 and Cipher = DHE-RSA-AES256-SHA

3. Update Splunk's relevant sslVersions and/or cipherSuite. In the example above, sslVersions should be set to tls (allows TLSv1, TLSv1.1, TLSv1.2) and DHE-RSA-AES256-SHA should be appended to the end of the default cipherSuites definition, e.g. add

$SPLUNK_HOME/etc/system/local/alert_actions.conf

:

[email]
sslVersions = tls

cipherSuites = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA


Search issues

Date filedIssue numberDescription
2022-06-23SPL-226017, SPL-176333Lookups may return incorrect results due to internal caching

Workaround:
Add

allow_caching=f to the lookup command:

| lookup <name> allow_caching=f ... 

On 7.3+:Add allow_caching=f to the lookup definition on the search head

transforms.conf:[<lookup name>]allow_caching = f

To check if you might be running into this issue, you'll need to enable debug on the search in question by adding:

| noop log_DEBUG=CachedProvider<pre>If you have hits for the cached lookup, like in the sample log below, you can hit this issue.<pre>DEBUG CachedProvider - Cached provider metrics: lookup=<lookup name> hits=67064 misses=321 total=67385
2021-12-21SPL-216787Searches are cancelled or time out when the user leaves the browser window or switches tabs.

Workaround:
In Splunk Enterprise 8.1.7, 8.2.4, and higher change the job_default_auto_cancel setting in $SPLUNK_HOME/etc/system/local/web.conf from the default value of 30 to 62.

Details
This issue is caused by power saving settings in recent browser versions, where Javascript timers may be throttled. The user typically sees the following message in the search window on foreground searches:

DAG Execution Exception: Search has been cancelled
Search auto-canceled
The search job has failed due to an error. You may be able to view the job in the Job Inspector

2021-09-22SPL-212495, SPL-196040, SPL-219811Excessive logging 'WARN SearchResultsFiles Unable to parse site_label, label=invalid due to err="Invalid site id: invalid"' for SearchResultsFiles

Workaround:
none

2021-09-17SPL-212284Batch search: with batch_search_max_pipeline of more than 1, search silently only returns data from buckets every n=batch_search_max_pipeline buckets

Workaround:
This is limited to standalone Splunk instances or when returning data from the SH itself in a distributed setup

set allow_batch_mode to 1 and batch_search_max_pipeline to 1 (defaults)

etc/system/local/limits.conf[search]allow_batch_mode = 1batch_search_max_pipeline = 1

or disable batch mode with allow_batch_mode to 0

2021-03-08SPL-202077, SPL-176333Lookups may return incorrect results due to internal caching

Workaround:
Add

allow_caching=f to the lookup command:

| lookup <name> allow_caching=f ... 

On 7.3+:Add allow_caching=f to the lookup definition on the search head

(Video) Using Splunk Internal Indexes to Audit Security, Users, Searches and more.

transforms.conf:[<lookup name>]allow_caching = f

To check if you might be running into this issue, you'll need to enable debug on the search in question by adding:

| noop log_DEBUG=CachedProvider<pre>If you have hits for the cached lookup, like in the sample log below, you can hit this issue.<pre>DEBUG CachedProvider - Cached provider metrics: lookup=<lookup name> hits=67064 misses=321 total=67385
2021-02-25SPL-201628`srchTimeWin` and `srchTimeEarliest` settings cannot be unset for the admin role.

Workaround:
Ensure that the admin role is not configured as "Unset" and is explicitly configured to either no restriction or a restriction in the UI (Navigate to Edit Role > Resources > Role search time window limit), or through conf file authorize.conf under attribute name srchTimeEarliest.

2020-12-06SPL-198314Exporting _time field applies user timezone offset but contains the server's timezone (usually +0000)

Workaround:
Force a specific time format by using strftime in an eval command.

for example, add

 | convert timeformat="%FT%T.%3Q%z" ctime(_time)

to the end of your search

2020-12-04SPL-198284Crash in PrecacheUsersThread when max_searches_per_process is set lower than default

Workaround:
Set limits.conf back to default, by removing any override of max_searches_per_process.

For example:

[search]max_searches_per_process=1

to

[search]
2020-12-01SPL-198149, SPL-198866, SPL-199358KVStore lookup indexing leads to slow search performance and intermittent errors in searches

Workaround:
If you encounter this problem, change the enable_splunkd_kv_lookup_indexing parameter to true in the [lookup] stanza of limits.conf in the $SPLUNK_HOME/etc/system/local directory on your search peers.

2020-08-31SPL-194426External search command chunked v2 python SDK fails with multibyte result data under python 3.

Workaround:
Apps may experience this issue if they: implement a custom search command using the Splunk Enterprise SDK for Python between versions 1.6.5 and 1.6.13; are executed by Splunk Enterprise or Splunk Cloud using Python 3; and are sent events with multi-byte characters.

App developers whose apps implement a custom search command using a version of the Splunk Enterprise SDK for Python must update to version 1.6.14 or higher and release new versions of their apps.

Splunk Enterprise and Splunk Cloud administrators who are using apps impacted by this issue must update to app versions that use the Splunk Enterprise SDK for Python version 1.6.14 or higher. If this is not possible, administrators are encouraged to either: allow these apps to be executed using Python 2; or cease usage of impacted apps until updated versions are available.

2020-02-12SPL-183259When generating LISPY for field values that are numbers (""), the values aren't deduplicated, which can cause slowdowns in certain scenarios

Workaround:
Dedup values in search before, for example:

instead of

index="field_test" [search index="field_test" globalCallID_callId=1234* | fields globalCallID_callId]

add a stats or dedup in the subsearch:

index="field_test" [search index="field_test" globalCallID_callId=123* | stats values(globalCallID_callId) AS globalCallID_callId | mvexpand globalCallID_callId ]

If that list is still large and you're seeing the slowdown, consider moving the filtering to a | where after the initial search, for example:

index="field_test" globalCallID_callId=* | where [search index="field_test" globalCallID_callId=123* | stats values(globalCallID_callId) AS globalCallID_callId | mvexpand globalCallID_callId ]
2020-01-10SPL-181573geostats provides incorrect results for lower zoom levels when split BY has a higher cardinality than globallimit.

Workaround:
- Increase globallimit to the value of "unique values" number mentioned in the warning message:

"The split by field <field> has a large number of unique values <number>. Chart column set will be trimmed to 10. Use globallimit argument to control column count."

- Use very high globallimit in geostats and post process after if needed

- Don't use BY in geostats

- Use lower cardinality BY and/or higher globallimit in geostats

2017-07-13SPL-143111"Splunkd daemon is not responding" when edit local windows event log collection
2017-04-04SPL-140765Splunk having problems extracting json file consisting of 68k plus key-value pairs
2016-11-29SPL-133182When two datasets have identical names but one is local (private) while the other is global, attempts to view or extend the global dataset use results from the local dataset instead.
2016-04-27SPL-118911In SHC, referenced saved real-time searches in a dashboard do not stream results.

Workaround:
See Troubleshoot referenced real-time searches for workaround details.

Saved search, alerting, scheduling, and job management issues

Date filedIssue numberDescription
2019-09-20SPL-176812Multiple SH Clustering with single deployer can't use datamodel summary sharing
2018-09-19SPL-160286The data preview for the Add Data workflow does not display for Log to Metrics source types
2017-11-29SPL-146802Distributed environment requires index defined on search head for log event alerts
2017-08-14SPL-143947Report acceleration is broken for users with a configured role-based access filter

Charting, reporting, and visualization issues

Date filedIssue numberDescription
2022-04-26SPL-223193"Open in Search" function doesn't work with chained searches in Dashboard Studio when the time range depends on an input/token, showing error "Invalid earliest_time"
2021-04-30SPL-205069onunloadCancelJobs failed to cancel search job on Safari

Workaround:
Use another browser such as Chrome or Firefox

2021-04-05SPL-203554After upgrading from 8.1 to 8.2 or higher, dashboard images in the Dashboard Studio fail to load.

Workaround:
Two workaround options:

1. Re-upload the image. (Best for non-admins or Splunk Cloud customers)2. Copy/move collections (splunk-dashboard-icons and splunk-dashboard-images) from splunk-dashboard-app to splunk-dashboard-studio to see the custom images/icons in studio dashboards.

2021-02-12SPL-201015PNG export in the Dashboard Studio in Safari doesn't work on first try

Workaround:
Press the download button again

2020-07-28SPL-192751Dropdowns in XML Chart Formatting Modal does not show in dark mode
2020-07-20SPL-192213Dark mode does not get applied to XML dashboards when using unicode characters like smiley icons

Workaround:
Do not use unicode characters in Dashboards with dark mode.

2016-09-15SPL-128819, SPL-130243, SPL-130245Editing panel in dashboard removes charting.legend.masterlegend option

Workaround:
Use <option name="charting.legend.masterLegend">null</option>

2016-04-27SPL-118911In SHC, referenced saved real-time searches in a dashboard do not stream results.

Workaround:
See Troubleshoot referenced real-time searches for workaround details.

Data model and pivot issues

Date filedIssue numberDescription
2019-09-20SPL-176812Multiple SH Clustering with single deployer can't use datamodel summary sharing

Indexer and indexer clustering issues

Date filedIssue numberDescription
2022-03-28SPL-221431, SPL-216614Searchable Rolling Restart stuck reassigning primacy when indexers take more than streaming_replication_wait_secs to roll their buckets when being decommissioned.

Workaround:
Increase server.conf[clustering]streaming_replication_wait_secs to ensure all streaming targets will be completed. streaming_replication_wait_secs=1800 (a maximum wait of 30min) is not unreasonable, but the setting will affect all types of CM-initiated restarts, so make sure not to set it too high.

2016-08-25SPL-127353Data rebalance finishes early when one peer is the source for all buckets

Workaround:
when only one indexer in a cluster indexed data (has all the searchable copies), rebalance once before adding the new indexer, and then rebalance a second time

Distributed search and search head clustering issues

Date filedIssue numberDescription
2022-03-22SPL-221130, SPL-224931, SPL-225711Search head clustering - intermittent "Splunk Cloud" logo shown on splunkweb and "UNKNOWN_VERSION" Splunk version returned

Workaround:
Customers can verify whether their environment is affected with following SPL against their SHs:

index=_internal host IN (<CommaSeparatedSHList>) source=*web_service.log* "Splunk appserver version=UNKNOWN_VERSION build=000"

Refreshing the browser tab will temporarily resolve the issue. No root cause/fix has been identified yet.

2021-09-22SPL-212495, SPL-196040, SPL-219811Excessive logging 'WARN SearchResultsFiles Unable to parse site_label, label=invalid due to err="Invalid site id: invalid"' for SearchResultsFiles

Workaround:
none

2021-03-26SPL-203060The splunkd process changes the local distsearch.conf on service start

Workaround:
There is no workaround. After upgrading to Splunk Enterprise 8.x, the splunkd process checks and modifies the local/distsearch.conf on each service start. The process will:

  • Remove any settings that define default values already set in the /default/distsearch.conf file.
  • Removes comments preceded by a hash.
  • Reorders the KV pairs alphanumerically within a stanza.
  • Reorders stanzas within the file.
2019-09-02SPL-175786Not able to update search head settings by bundle application from deployer under Full mode if conf files are put in bundle's local folder
2017-11-29SPL-146802Distributed environment requires index defined on search head for log event alerts
2017-03-13SPL-138654Splunk searches fail when filepath gets too long on Windows
2016-07-12SPL-124085On Search Head Cluster It is not possible to remove an App from the SHs once it has been disabled.

Universal forwarder issues

Date filedIssue numberDescription
2022-06-23SPL-226019Warning appears in the universal forwarder whenever any spl command is run: Warning: Attempting to revert the SPLUNK_HOME ownership Warning: Executing "chown -R splunk /opt/splunkforwarder". This warning is expected and will not affect functionality.
2022-06-22SPL-226003When forwarding from an 9.0 instance with useAck enabled, ingestion stops after some time with errors: "Invalid ACK received from indexer="

Workaround:
As a workaround, disable useAck in outputs.conf on the forwarder. After disabling, indexers start to ingest data.

If customers do need useACK to prevent data loss, disabling autoBatch in outputs.conf can remediate the issue too, but it impacts throughput - no worse than 8.x, but no improvement for 9.0.

(Video) Creating Reports in Splunk Enterprise

2022-06-06SPL-225379Ownership of files mentioned in manifest file is splunk:splunk instead of root:root after enabling boot start as root user for initd

Workaround:
whenever changing UF user, pls manually chown SPLUNK_HOME to the new user, including first time install/upgrade, or manually enable boot-start

2022-05-16SPL-224264, SPL-224265Splunk UF not starting on Debian 11 (x86_64 and arm64)
2022-05-13SPL-224167Splunk UF for CentOS-7 (ARM64) is not available

Workaround:
UF for CentOS7 ARM 64 will be available in the 9.0.1 maintenance release.

2020-11-09SPL-197140UF failed to start on Solaris 11.3 with error: "symbol in6addr_any: referenced symbol not found"

Workaround:
1. Do not upgrade past Splunk 8.0.5 on Solaris 11.3

OR2. Upgrade to Solaris 11.4

Monitoring Console issues

Date filedIssue numberDescription
2019-11-13SPL-179528The splunktcp and splunktcp-ssl stanzas are not reloadable in inputs.conf
2017-08-14SPL-143981Uninstall app dialog does not show the app name correctly when the app doesn't have the label
2017-05-24SPL-141982Upload modal should use size=large File element
2017-04-19SPL-141274Clicking Install multiple times in Install dialog causes error
2017-03-07SPL-138351, SPL-172626The role change of DMC via UI does not reflect to distsearch.conf

Workaround:
As a workaround can the customer manually modify the distsearch.conf.

2016-11-14SPL-132151XML error when trying to download uninstalled app

Splunk Web and interface issues

Date filedIssue numberDescription
2022-05-31SPL-225037Remote dataset dropdown menu resets to "Index" after selecting federated provider
2021-12-21SPL-216787Searches are cancelled or time out when the user leaves the browser window or switches tabs.

Workaround:
In Splunk Enterprise 8.1.7, 8.2.4, and higher change the job_default_auto_cancel setting in $SPLUNK_HOME/etc/system/local/web.conf from the default value of 30 to 62.

Details
This issue is caused by power saving settings in recent browser versions, where Javascript timers may be throttled. The user typically sees the following message in the search window on foreground searches:

DAG Execution Exception: Search has been cancelled
Search auto-canceled
The search job has failed due to an error. You may be able to view the job in the Job Inspector

2017-07-13SPL-143111"Splunkd daemon is not responding" when edit local windows event log collection

Windows-specific issues

Date filedIssue numberDescription
2022-03-19SPL-221019WEC + subscription with ContentFormat "Events" - indexed ForwardedEvents show "Splunk could not get the description for this event" for the "Message" field

Workaround:
Following steps should be followed:

- to reconfigure subscription type to RenderedText:

wecutil ss <subscription-name> /cf:RenderedText

- in order to work around a MS defect on the WindowsEventViewer causing field description resolution failures within the WindowsEventViewer, when configuring RenderedText contentFormat you might want to also change the subscription locale, if not already done, to en-US:

wecutil ss <subscription-name> /l:en-US

and the same also for the datetime format on the WEC server to English (United States), see also here:

https://serverfault.com/questions/606144/win2012r2-eventlog-subscription-dont-display-informationshttps://social.technet.microsoft.com/Forums/ie/en-US/3fd3d1fc-1194-4899-978c-3283085648bc/eventlog-forwarding-issues-either-the-component-that-raises-this-event-is-not-installed-on-your

- please make sure to install the most recent Windows add-on compatible with your Splunk release, following the official installation documentation:

https://docs.splunk.com/Documentation/AddOns/released/Windows/Install

- please configure inputs.conf on the splunk instance running on the WEC server as follows, in order to onboard the ForwardedEvents data in XML format:

[WinEventLog://ForwardedEvents]renderXml = true

then save and restart splunk in order to apply the changes.

- last, but not least, unless renderXml was set to true already before installing/upgrading to a regressed version, you will need to rewrite your searches and reports in order to comply with the new/XML-specific field extractions shipped in the Windows add-on, since the data is now onboarded in XML format.

REST, Simple XML, and Advanced XML issues

Date filedIssue numberDescription
2020-07-28SPL-192792tsidxWritingLevel and other fields are set empty after updating index in UI
2017-07-13SPL-143111"Splunkd daemon is not responding" when edit local windows event log collection
2016-10-31SPL-131072Datamodel backend allows invalid time values

PDF issues

Date filedIssue numberDescription
2016-11-23SPL-132925Table data rows generated with the addcoltotals command do not show up in PDF

Workaround:
If you are using addcoltotals to generate a totals data row, renaming the _time field can cause PDF generation issues.

Remove the label and labelfield or change the label to a number to generate the PDF as expected.

Admin and CLI issues

Date filedIssue numberDescription
2021-03-26SPL-203060The splunkd process changes the local distsearch.conf on service start

Workaround:
There is no workaround. After upgrading to Splunk Enterprise 8.x, the splunkd process checks and modifies the local/distsearch.conf on each service start. The process will:

  • Remove any settings that define default values already set in the /default/distsearch.conf file.
  • Removes comments preceded by a hash.
  • Reorders the KV pairs alphanumerically within a stanza.
  • Reorders stanzas within the file.
2020-07-28SPL-192792tsidxWritingLevel and other fields are set empty after updating index in UI
2020-04-14SPL-186365Users are able to create/clone knowledge objects into apps where they lack permissions
2019-08-05SPL-174406, SPL-109254Root unable to run splunk cli if SPLUNK_OS_USER is set
2018-08-13SPL-158658A timeout or slow response when accessing Splunk Web Licensing page

Workaround:
A timeout or slow performance of the license management page is caused by a build-up of historical license warning messages, which are processed every time the page is accessed. Can be verified by running this search on the License Manager:

| rest splunk_server=local /services/licenser/messages

If a high value is returned for that end point, you are likely affected. Log a support ticket with Splunk to obtain a license reset key, and apply the key to clear out any historical license warning messages. After the reset license is applied, the license management pages should load normally.

2017-11-29SPL-146820Unable to access some settings/manager pages (data model editor) if starting from the setup page of a non-visible app

Workaround:
Navigate to a visible app, such as the search and reporting app, and access the Splunk settings pages from that app context.

2017-11-07SPL-146255limits.conf enable_clipping cloropleth setting is app/user tunable rather than global like the rest of limits.conf
2017-04-03SPL-140747SSL connection in Python when using new ciphers may be slow.
2016-11-09SPL-131880Reports/Alerts owned by the deleted user cannot be found in the Orphaned filter for the Reassign Knowledge Objects page

Uncategorized issues

Date filedIssue numberDescription
2022-07-15SPL-226877Federated Search UI Error: Cannot create saved search dataset for federated index if dataset name contains space

Workaround:
Use REST API to create the federated saved search instead:

curl -k -u <username>:<password> -X POST https://localhost:8089/servicesNS/nobody/search/data/federated/index -d name=federated:index_kathy -d federated.dataset='savedsearch:ss with space' -d federated.provider=remote_deployment_1
See [[Documentation:*:RESTREF:RESTfederated|Federated search endpoint descriptions]] in the REST API Reference Manual.

2022-06-30SPL-226400, SPL-226485Queues blocked infinitely with useACK.

Workaround:
Turn off useACK

useACK=false

2022-05-25SPL-225455Splunk Assist: On indexer cluster managers, an "Error loading assist: try the operation again or contact Splunk support" message appears
2022-04-27SPL-223358, SPL-217652Splunk Assist: The CertAssist component does not display all hosts that use the same certificate
2022-04-12SPL-222543, SPL-224946Unable to generate diag - "UnicodeDecodeError: 'utf-8' codec can't decode byte XxXX in position YY: invalid start byte"

Workaround:
The problem is caused by non-ASCII/UTF-8 characters, that are present in your configuration and are not supported. You can remediate the problem:

1. Either remove non-ASCII/UTF-8 characters from your configuration files.2. Or take a backup of '$SPLUNK_HOME/lib/python3.7/site-packages/splunk/clilib/cli_common.py' and in line 127: Add parameter to "line.decode" - either "errors='replace'", or "errors='ignore'". Eg:line.decode(errors='replace')

2022-04-08SPL-222366Ingest Actions does not work with Splunk's free license
2022-02-24SPL-219715, SPL-225376, SPL-225374, SPL-225375Workload Management fails to enable on restart if a rule contains a role that is missing on the platform
2022-02-08SPL-218841Reporting command in verbose mode returns 0 events despite correct event_count
2022-02-08SPL-218842, SPL-219793Some reporting commands in federated search return incorrect eventCount

Workaround:
Use Verbose and Smart mode specifically for searches with transforming commands like stats, chart, and timechart, and then review the results in the Statistics tab. To review event counts, run non-transforming searches in Fast mode.

2021-10-14SPL-213745Standard mode federated search: Unable to set federated index as default index
2021-04-24SPL-204740, SPL-204735Deletion of a workload pool is allowed if there is a 'disabled' rule that is related to that workload pool and this can cause errors if the rule is re-enabled later

Workaround:
To prevent this issue: When you delete a workload pool, please make sure that you delete any disabled workload rules that are associated with that workload pool.

To resolve the issue if you encounter this: Disable or delete the workload rule that is associated with a workload pool that does not exist anymore.

2021-03-29SPL-203100Summary page on monitoring console doesn't show correct RF/SF when not running on the CM ifself
2021-03-19SPL-202682The license usage report tab name is Previous 60 days, but the reports run over the last 30 days
2021-02-10SPL-200532SmartStore: Stuck fixup due to inability to freeze unsearchable/unstable bucket

Workaround:
This issue is caused by a single unsearchable bucket that has been frozen while not existing on remote storage. The bucket copy on the peer node's cache remains stuck in the fixup state, resulting in messages to the effect that all data is not searchable, the replication factor is not met, and the search factor is not met.

To resolve, on the peer node, invoke the "/services/cluster/slave/buckets" endpoint, specifying the faulty bucket, setting "search_state=Searchable" to make the bucket searchable. You do not need to restart the peer node afterwards.

Here is the syntax for the required endpoint:

curl -k -u admin https://<peer_node_with_bucket>:<mgmt_port>/services/cluster/slave/buckets/<bucket_id>/change_bucket -d bucket_mask=0 -d search_state=Searchable -d generation_id=0 -d searchable_sources="peer,site,server_name,host_port_pair,replication_port,replication_use_ssl,searchable,bucket_mask

(Video) Splunk admin Resume explanation.

Note that pairs of angle brackets indicate variables that must correspond to your instance and bucket.

2020-10-01SPL-195810Using CLI command to stop migration of KVstore on a SHC running on Windows OS can cause the SHC captain to reach an invalid state

Workaround:
Restart the SHC captain

2020-08-10SPL-193389Parallel upload is not supported in gcp-sse-kms encryption mode

Workaround:
In the volumes using gcp-sse-kms encryption mode, specify "remote.gs.upload_chunk_size = 0" to disable parallel upload.

2020-07-30SPL-192936Subsecond search - When you update metric.timestampResolution via the UI, it is not updated on the search head index.conf file. This does not affect search functionality.
2020-05-06SPL-188800Starting Splunk software with incorrect KV store storage engine causes KV store to crash

Workaround:
In the [kvstore] stanza of your server.conf file, set the storageEngine setting to match the storage engine that you're using, either wiredTiger or mmapv1. To learn which storage engine you're using, check whether the file extensions in the var/lib/splunk/kvstore/mongo directory are *.wt for Wired Tiger or *.ns for Memory Mapped.

2019-10-03SPL-177447Bundle replication takes longer than expected time for indexers that have bundleEnforcerBlacklist configured
2019-09-26SPL-177144, SPL-177326Under heavy search workload, the search memory usage estimation may be higher than actual usage
2019-09-25SPL-177008, SPL-176710, SPL-177009Workload management fails to enable for addition of a pool with 1% cpu and 1% memory
2019-09-16SPL-176514Offline rebuild of unsearchable bucket may lead to stale information in dbinspect searches
2019-09-13SPL-176447SmartStore: Migration uploads of auto_high_volume buckets can fail indefinitely due to an XFS bug

Workaround:
Before migration, lower the max_concurrent_uploads setting in server.conf to 2.

After migration, revert the setting to the default of 8.

2019-07-19SPL-173449, SPL-173259timezone isn't stored for start_time/end_time of rule schedule every_day/every_week/every_month
2019-03-26SPL-168314SmartStore standalone instance + Monitoring Console: Bootstrapping panel needs to reflect the standalone bootstrapping process
2018-03-20SPL-152330, SPL-151992After installing Splunk on Windows using msiexec and the "GENRANDOMPASSWORD=1" option (and if generated password ends with backslash) admin is unable to login with msg "No users exist. Please set up a new user."

Workaround:
Create a $SPLUNK_HOME/etc/system/local/user-seed.conf and restart Splunk

[user_info]
PASSWORD = <yourpassword>


2017-06-29SPL-142789, SPL-95144Indexed message for Windows security event logs shows "FormatMessage error"

Workaround:
Splunk believes this was introduced in a Microsoft Windows patch. The workaround is to configure a delayed start of the Splunk service(s) so that it starts after the Windows Event Log service.

2017-05-09SPL-141693DataModel Editor - when child object has same name as inherited field, inherited field does not show in the inherited fields list.
2017-04-27SPL-141478$_index_name does not resolve properly when used with the thawedPath pathname
2017-03-27SPL-140442, SOLNESS-11786In Splunk Enterprise 6.6.0 and later, with Enterprise Security 4.5.2 and 4.6.0, roles without "edit_roles" capability cannot perform operations on notable event review statuses.

Workaround:
If users cannot perform operations on notable event review statuses or have issues viewing "Edit all selected" links on Incident Review, user roles must be provided with the "edit_roles" capability.

2017-03-14SPL-138731New 6.6 and later default SHA256/2048-bit key certificates are not compatible with previous versions SHA1/1024-bit key certificates if cert verification is enabled

Workaround:
Users can do any of the following:

1. Disable certificate verification - the same root certificate is available with every Splunk download so enabling certificate verification while using the default certificates provides very little additional security.

2. Generate new SHA256/2048-bit key certificates using the new 6.6 root certificate and distribute to older versions of Splunk

3. Generate SHA1/1024-bit key certificates using the old root certificate to use with your new 6.6 instance. For convenience, the old root certificate is included in 6.6 in $SPLUNK_HOME/etc/auth/prev_release/

2017-01-06SPL-134707Splunk restart does not create missing server.pem certificate on Windows

Workaround:
Use bin/splunk createssl server-cert -d etc/auth/ -n server to generate a new certificate.

2016-11-21SPL-132670Mac OS 10.11: disable boot-start doesn't remove the file /Library/LaunchAgents//com.splunk.plist by enabling boot-start in prior Splunk/UF
2016-08-31SPL-127800Opting in to data sharing on a monitoring console produces duplicate data.
2016-06-21SPL-123174JSON indexed_extractions doesn't work for TCP inputs

Splunk Analytics for Hadoop

Date filedIssue numberDescription
2017-04-04ERP-2040Splunk archiving fails for large block sizes (buckets) due to HDFS write crashes for Hadoop version 2.8, 2.7.x

Workaround:
Upgrade Hadoop to 2.8.2 or higher.

2015-09-09ERP-1650timestamp data type not properly deserialized.
2015-08-05ERP-1619Searching on a newly created archive index before the bucket copy saved search is run causes a filenotfound exception.

Workaround:
Reenable the bucket copy saved search and let it run, or force the archiving to happen via | archivebuckets force=1 and then rerun the search.

2015-07-07ERP-1598minsplit rampup - splits generation takes too long.

Workaround:
Set minsplits=maxsplits

2015-05-12ERP-1502Non-accelerated pivot search on Pivot UI page waits for a long time to return result.
2015-01-08ERP-1343, SPL-95174Splunk Analytics for Hadoop searches fail on corrupted journal.gz files, although Splunk searches run without error.

Workaround:
Add the journal.gz to the input path's blacklist (vix.input.1.ignore = ....)

2014-10-27ERP-1216Data Explorer preview does not honor existing sourcetypes for big5/sjis files.
2014-10-03ERP-1164Report acceleration summary gets deleted when two Splunk Analytics for Hadoop instances point to the same Splunk working directory.

Workaround:
To mitigate this issue, make sure that vix.splunk.home.hdfs (or Working directory in the UI) is unique on both search heads that are not in a pool. To keep your instances in the same working directory, configure vix.splunk.search.cache.path to be unique on both search heads.

Last modified on 19 July, 2022

PREVIOUS
Welcome to Splunk Enterprise 9.0
NEXT
Splunk Enterprise and anti-virus products

This documentation applies to the following versions of Splunk® Enterprise: 9.0.0

FAQs

How do I check Splunk errors? ›

Search for errors using Splunk Light
  1. If you want to find events with "error", start by typing in the keyword. ...
  2. To make the searches more efficient, use as many keywords as possible to describe the event. ...
  3. Search Apache web access logs for 404 status errors. ...
  4. Find all client and server errors.
26 Sept 2016

What are 3 ways to get data into Splunk? ›

You can use the CLI to configure most types of inputs. You can also use it on a heavy forwarder to get data into Splunk Cloud Platform.
...
The Splunk Enterprise Add Data page has an additional option for getting data in:
  1. Upload data.
  2. Monitor data.
  3. Forward data.

What is the most efficient way to limit search results returned Splunk? ›

Using time to limit the events returned is the most efficient way to filter events. The less data you have to search, the faster Splunk will be. After time, the default fields of index, source, host, and sourcetype are the most powerful.

What are the limitations of Splunk? ›

Charts, detectors, and SignalFlow limits
Limit nameDefault limit value
Maximum number of active alerts per detector200,000
Maximum number of allocated data points per SignalFlow program60,000,000
Maximum number of queries per SignalFlow program200
Maximum number of derived MTS per SignalFlow program500,000
16 more rows

How do I query logs in Splunk? ›

Searching logs using splunk is simple and straightforward. You just need to enter the keyword that you want search in logs and hit enter,just like google. You will get all logs related to search term as result.

How do I monitor Splunk logs? ›

From Splunk Home: Click the Add Data link in Splunk Home. Click Monitor to monitor Event Log data on the local Windows machine, or Forward to forward Event Log data from another Windows machine.
...
From Splunk Settings:
  1. Click Settings > Data Inputs.
  2. Click Local event log collection.
  3. Click New to add an input.
6 May 2022

Is Splunk difficult to learn? ›

Is Splunk Easy to Learn? The courses to learn Splunk are easily accessible online. However, it simply takes time and dedication to learn like any skill. There are many courses available online that you can take in the ease of your own home from your laptop.

Where is data stored in Splunk? ›

Data arriving within a Splunk indexer, as it's being parsed, is placed into a structure named a bucket – a directory in a file structure.

What is the main use of Splunk? ›

Splunk is used for monitoring and searching through big data. It indexes and correlates information in a container that makes it searchable, and makes it possible to generate alerts, reports and visualizations.

How can I improve my Splunk query performance? ›

How To Improve Splunk Performance
  1. Populating data into index-time fields and searching with the tstats command.
  2. Converting logs into metrics and populating metrics indexes.
  3. Aggregating data from multiple events into one record.
8 Jul 2021

How can I make Splunk queries faster? ›

If your Splunk searches are taking a long time to run, here are simple things you can do to improve them.
  1. Be specfic. The most important thing to be specific about is the index and time-range of your search – avoid searching index=* or doing all-time searches. ...
  2. Wildcard with care. ...
  3. Use TERM()s.
2 Apr 2021

What problems does Splunk solve? ›

Splunk allows you to monitor many aspects of the infrastructure, from network traffic to storage, from messaging platforms to servers, from containers to databases. The Splunk implementation offers a significant decrease in Mean Time To Resolution (MTTR) and lowers monitoring costs, allowing enterprises to work better.

Is Splunk the best tool? ›

Splunk Advantages

Splunk is more than just a log collection tool. It's costly because it's feature-rich for enterprise-level organizations. The Splunk tool ingests, parses, and indexes all kinds of machine data, including event logs, server logs, files, and network events.

Is Splunk a good SIEM? ›

Splunk is not a SIEM but you can use it for similar purposes. It is mainly for log management and stores the real-time data as events in the form of indexers. It helps to visualize data in the form of dashboards.

What are Splunk logs? ›

Logs contain a record of customer activity and behavior, product and service usage, and transactions. Logs contain a record of activity for IT components, such as applications, servers and network devices.

What is Splunk is used for? ›

Splunk is used for monitoring and searching through big data. It indexes and correlates information in a container that makes it searchable, and makes it possible to generate alerts, reports and visualizations.

Who is able to view a saved report in Splunk? ›

When you save a new report, its Permissions are set to "Private" by default. This means that only you can view and edit the report. You can allow other apps to view, or edit, or view and edit the reports by changing its Permissions.

Which command can be used to further filter results in a Splunk search? ›

Append. Use these commands to append one set of results with another set or to itself. Appends subsearch results to current results. Appends the fields of the subsearch results to current results, first results to first result, second to second, and so on.

Videos

1. Troubleshooting Splunk(Part 1) : Intrduction & Splunk internal log analysis for file monitoring
(Splunk & Machine Learning)
2. Splunk FishBucket Tutorial | What is Fishbucket in Splunk | Fishbucket Command | Splunk Training
(Online Tutorial)
3. Splunk Commands : Everything to know about "eval" command
(Splunk & Machine Learning)
4. We are Splunk Docs
(Splunk Docs)
5. Data Forwarder & Splunk Configuration
(VMware Carbon Black)
6. How to Avoid Splunk Upgrade Mistakes - Webinar Replay - Kinney Group
(Kinney Group)
Top Articles
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated: 22/03/2023

Views: 5542

Rating: 4.2 / 5 (43 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.