Splunk® Add-on for Unix and Linux

Deploy and Use the Splunk Add-on for Unix and Linux

Download manual as PDF

The documentation for the current version of this Add-on has moved. See the current version of the documentation for the Splunk Add-on for Unix and Linux.
Download topic as PDF

Release notes for Splunk Add-on for Unix and Linux

This topic contains information on new features, known issues, and updates as we version the Splunk Add-on for Unix and Linux.

The Splunk Add-on for Unix and Linux was last updated in December 2017.

What's new

See the known issues and fixed issues of these release notes for product updates.

Fixed issues

Version 5.2.4 of the Splunk Add-on for Unix and Linux fixed the following issues:

Date resolved Issue number Description
2017-04-17 ADDON-8472 Logic failure in rlog.sh creates duplicates when the seekpointer file cannot be updated and silently fails
2017-03-28 ADDON-13680 The dest field is not extracted for some events

Known Issues

Version 5.2.4 of the Splunk Add-on for Unix and Linux has the following known issues:

Date filed Issue number Description
2018-04-18 ADDON-17747 package.sh not working in FreeBSD 10 and FreeBSD 11
2018-03-28 ADDON-17571 AWS TA and *nix TA lack spec files for eventgen.conf, which causes cluster bundle validation errors, and breaks Manage Indexes page in clustered Splunk Cloud

Workaround:
Splunk Cloud customers who cannot create indexes on their own due to this bug should file a support case when they need new indexes created.
2017-05-09 ADDON-14719 Add-on not Supporting current OS Releases
2017-05-05 ADDON-14708 Upgrade Splunk Add-on for Unix to support RHEL 7.3
2017-03-13 ADDON-14093 vmstat script error on AIX
2017-03-06 ADDON-13986 cpu.sh indexed output is missing core number.

Workaround:
Edit contents of cpu.sh script as follows:

#Need to change to always be 24Hour time with export LC_TIME=POSIX export LC_TIME='POSIX' FORMAT='{cpu=$2; pctUser=$3; pctNice=$4; pctSystem=$5; pctIowait=$6; pctSteal=$7; pctIdle=$NF}'

2016-11-10 ADDON-12085 recursive search for bash_histories is expensive
PREVIOUS
Source types and CIM data model info
 

This documentation applies to the following versions of Splunk® Add-on for Unix and Linux: 5.2.4


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters