Known Issues
The following are issues and workarounds for this version of the Splunk App for Enterprise Security.
Highlighted issues
Publication date | Defect number | Description |
Pre-3.2 | SOLNESS-5786 | Splunk Enterprise users added from LDAP/AD and later disabled from the directory service do not appear to be removed from Splunk Enterprise. Attempting to remove the user displays the error:
Workaround: From the command line, run |
Pre-3.2 | CIM-169 | After installing the Enterprise Security app, the splunkd.log displays a warning message:
Workaround: Disable truncation on the indexers using the
|
Configuration
Publication date | Defect number | Description |
2014-12-4 | SOLNESS-5902 | During bundle replication, a large .context file may cause search timeouts.
Workaround: Update the
|
Hardware prerequisites
Publication date | Defect number | Description |
Pre-3.2 | SOLNESS-4256 | Running Splunk Enterprise on Windows with under-provisioned virtualized hardware may cause Enterprise Security setup to fail. If the instance meets the "virtualized hardware" specifications, retry the setup if it fails the first time. |
Pre-3.2 | — |
A dashboard view reports: Error in 'DistributedSearchResultsCollectionManager'. Operating system thread limit reached; search could not be run.
This is expected behavior when the |
Incident Review
Publication date | Defect number | Description |
Pre-3.2 | SOLNESS-1784 | Contributing events from any notable event in the Incident Review dashboard will default to "All Time" and may take a long time to return results. To workaround this issue, cancel the search and rerun with the desired time window. |
Pre-3.2 | SOLNESS-2508 | The Incident Review dashboard feature does not work on the Solaris operating system. |
Pre-3.2 | SOLNESS-5072 | The maximum number of notable events displayed for editing is 1000, regardless of the filter options or total number of notable events. This is the expected behavior set by default in the limits.conf setting max_events_per_bucket , and can be changed as required.
|
2015-05-26 | SOLNESS-6878 | When saving the changes to a selection of more than 1000 notable events, the update will fail with the error The update failed:ResultSet.iter – timed out while waiting on data; expected 100 events, only got 0; count=xxxx . This is the expected behavior set by default in the limits.conf setting max_events_per_bucket , and can be changed as required.
|
Dashboards
Publication date | Defect number | Description |
Pre-3.2 | SOLNESS-4387 | When working with individual Reports (Search > Reports), some drill down functionality may not produce desired behavior. This is dependent on the structure of the search, and the search commands being used. This should not affect shipped dashboards. If adding a report to ones own dashboard, for best results use Simple XML to define explicit drill down. |
Pre-3.2 | SOLNESS-5752 | When using the Account Management dashboard to view Account Lockouts, a drilldown to investigate events runs slowly. This is expected behavior. A drilldown will run a historical search across all events in a data model, where the dashboard view uses only accelerated data for faster visual response. |
Pre-3.2 | SOLNESS-4631 | When using Advanced Threat dashboards, some dashboard views display a yellow warning sign triangle even if the view displays results. The warning reports:
This is expected behavior and is harmless. The lookup files referenced in the warning message manages the per-panel filtering feature in Enterprise Security. Per-panel filtering is used to filter or whitelist items out of dashboard views that are deemed unimportant or non-threatening. Until the per-panel filter lookup is used, the file is empty and contains only a header. This status does not affect the functioning of the dashboard panel. See "Per-Panel Filter Audit" in the Enterprise Security Installation and Configuration Manual for more information. |
2014-11-07 | SOLNESS-5676 | The Create Notable Event workflow action may result in a truncated notable event with missing fields. |
2014-11-13 | SOLNESS-5807 | The Asset Investigator swimlanes for protocol data do not display common events in the event view when a object is selected. |
2014-12-04 | SOLNESS-5921 | Using the lookup editor under Configure > Data Enrichment > Lists and Lookups will visually truncate the number of rows in a lookup to 60 or less, rendering any unseen rows unable to be edited. The issue does not limit the functionality of the lookup, or truncate the contents. |
2014-12-05 | SOLNESS-5925 | A link to Add a new indicator appears when adding a Key Security Indicator to an unpopulated dashboard. If the link is used to add indicators, upon saving the changes, the indicators added will fail to appear. |
Reports
Publication date | Defect number | Description |
Pre-3.2 | SOLNESS-3536 | In any Individual Reports window, selecting a real-time Time Range such as: 24 hour window, 30 minute window, etc. will cause a display error:
Workaround: Use a relative "Time Range" such as: Last 24 hours or Last 15 minutes. |
Pre-3.2 | SOLNESS-4387 | When adding a report to a custom dashboard in the Enterprise Security app, the report's drilldown search may not produce the desired behavior. This includes pre-defined reports included with the Enterprise Security app.
Workaround: Test all report drilldown behaviors on custom dashboards, and use Simple XML to define the drilldown search for each report as desired. |
2014-12-16 | SOLNESS-5969 | When adding a custom swim lane to the Enterprise Security app where the base search uses a constraint_method = string in place of an asset lookup, the swim lane fails to populate. Examining the search log shows the error: Invalid constraint field requested .
|
2015-01-15 | SOLNESS-6054 | The format of Incident Review audit data has been optimized. To review Incident Review audit events created prior to ES 3.2, update your audit search as needed and add the latest extractions. Example:
|
2015-04-24 | SOLNESS-6670 | When the correlation search Potential Gap in Data is enabled, the search will report false positive matches. Workaround: Update the contents of the search.
|
2016-05-23 | SOLNESS-9420 |
Extreme search causing multiple core dump files Workaround: Filter results where the size is zero. Edit the problematic context gen search in the configuration file or on the Content Management page to include |where size > 0 . For example:| tstats `summariesonly` dc(All_Traffic.src) as src_count from datamodel=Network_Traffic by _time span=30m | stats count, median(src_count) as median, stdev(src_count) as size | where size>0 | xsupdateddcontext name=src_count_30m container=network_traffic terms="minimal,low,medium,high,extreme" type=median_centered width=3 app=SA-NetworkProtection scope=app | stats count |
Inputs
Publication date | Defect number | Description |
Pre-3.2 | SOLNESS-4785 | The threat list emerging_threats_malvertisers_blocklist has been obsoleted]. The input has been removed from the available threat lists. For more details see the notice at the threat list site (http://rules.emergingthreats.net/blockrules/emerging-rbn-malvertisers-BLOCK.rules).
|
Pre-3.2 | SOLNESS-4254 | While configuring or editing a modular input for a threat list, the "Interval" parameter cannot be specified through the UI.
Workaround: Configure all other input parameters through the UI, and change the run "Interval" from the command line. |
Pre-3.2 | SOLNESS-5401 | A threat list download attempt from an HTTPS URL may fail to download if proxy authentication is in use. Checking the $SPLUNK_HOME/var/log/splunk/python_modular_input.log shows an authentication failure:
A patch to the Python libraries
|
2014-11-25 | SOLNESS-5873 | When installing the Enterprise Security App on Microsoft Windows, the inputs.conf settings for enforcing the Email data model acceleration are missing.
Workaround: If the Email data model acceleration is disabled, it must be enabled again manually. |
Search Head Pooling
Publication date | Defect number | Description |
Pre-3.2 | —
|
Any stanza in inputs.conf that references an object in the shared pool mount must use an absolute path. In Enterprise Security, an audited lookup table requires an input. That input stanza must be updated when using search head pooling since /etc/apps/* resides on the pool, and is no longer tied to the relative path $SPLUNK_HOME.
Example:
In
|
Fixed Issues | Learn More and how to get help |
This documentation applies to the following versions of Splunk® Enterprise Security: 3.2
Feedback submitted, thanks!