Splunk® Enterprise Security

Administer Splunk Enterprise Security

Turn on debug logging in Splunk Enterprise Security

You can turn on debug logging for each component in Splunk Enterprise Security. See Turn on debug logging in the Splunk Enterprise Troubleshooting Manual for general information about debug logging.

Turn on debug logging for adaptive response actions

Adaptive response actions have a global param.verbose setting that can be applied to the alert_actions.conf file to affect all invocations of the action. You can also use the savedsearches.conf file to place the action in "debug mode" for action invocations specific to that saved search.

To turn on debug logging through the CLI, edit the savedsearches.conf file as follows:

## $SPLUNK_HOME/etc/apps/<app>/local/savedsearches.conf
[<search_name>]
...
action.<action_name>.param.verbose = true
...

After changing the parameter, reload savedsearches from the UI.

To turn on debug logging through the GUI, set verbose to true in the following location:

  1. From the Splunk platform menu bar, select Settings and click Searches, Reports, and Alerts.
  2. Search for the name of saved search using the search filter.
  3. Click Edit > Advanced Edit.
  4. Scroll to action.<action_name>.param.verbose
  5. Set it to true.
  6. Click Save.

See Set up adaptive response actions in Splunk Enterprise Security in the Administer Splunk Enterprise Security manual for general information about adaptive response actions.

Turn on debug logging for custom search commands protocol, Version 2

See Create custom search commands for apps in Splunk Cloud Platform or Splunk Enterprise in the Developer Guide on the Developer Portal for information about version 2 of the Custom Search Command protocol.

You can use the "| noop log_DEBUG=*" command to set the Version 2 Custom Search Command protocol, or chunked, logging level to debug. This works due to a stream handler that sends the logging output to the sys.stderr stream, which is used by searches and displayed in the search.log.

To set the noop command, append it to the end of your chunked custom search, for example:

| ... | <chunked_search_command> | noop log_DEBUG=*

Turn on debug logging for custom search command protocol, Version 1

Version 1 of the Custom Search Command protocol, or Intersplunk search command, currently does not respect "| noop log_DEBUG=*". Log levels can only be modified by altering the command python script at your own risk. Intersplunk search commands currently log to their own explicit log files instead of search.log.

See Create custom search commands for apps in Splunk Cloud or Splunk Enterprise in the Developer Guide on the Developer Portal for information about version 1 of the Custom Search Command protocol.

Turn on debug logging for extensible administration interface handlers

Extensible Administration Interface (EAI) handlers log levels can be modified by altering the handler python script at your own risk.

See [admin_external:<uniqueName>] from restmap.conf in the Splunk Enterprise Admin Manual for general information about EAI handlers.

Turn on debug logging for modular inputs

Modular inputs use a globally defined "debug" setting" that can be toggled in the inputs.conf file.

To turn on debug logging through the CLI, edit the inputs.conf file as follows:

## $SPLUNK_HOME/etc/apps/<app>/local/inputs.conf
[<modular_input_name>://<module_input_instance>]
debug = true

To turn on debug logging through the UI for most modular inputs, it is similar to the following:

  1. From the Splunk platform menu bar, select Settings and click Data inputs.
  2. Select a modular input such as Threat Intelligence Manager.
  3. Click an input such as da_ess_threat_local.
  4. Check the check box for Debug.
  5. Click Save.

To turn on debug logging through the UI for Asset and Identity Management:

  1. From the Splunk Enterprise Security menu bar, select Configure > Data Enrichment > Asset and Identity Management.
  2. Click the Global Settings tab.
  3. Turn on the toggle switch for Debug Mode.
  4. Click Save.

See Create custom data inputs for Splunk Cloud Platform or Splunk Enterprise on the Splunk Developer Portal for information about modular inputs.

Turn on debug logging for Script Handlers

Script handlers can use the script.args.<N> = debug setting in the restmap.conf file to turn on debug mode (N here is an integer). Please note that the scripttype setting must be set to "persist" for this to work.

You cannot currently edit script.args in the restmap.conf file through the GUI.

To turn on debug logging through the CLI, edit the restmap.conf file as follows:

## $SPLUNK_HOME/etc/apps/<app>/local/restmap.conf
[script:<script_handler_name>]
...
script.arg.<N> = debug
...

See restmap.conf in the Splunk Enterprise Admin Manual for general information about script handlers.

Turn on debug logging for scripted lookups

No UI or CLI methods are available for enabling debug logging of scripted lookups.

See Configure external lookups in the Splunk Enterprise Knowledge Manager Manual for general info about scripted lookups.

Last modified on 11 August, 2023
Troubleshoot search results   Log files in Splunk Enterprise Security

This documentation applies to the following versions of Splunk® Enterprise Security: 7.0.1, 7.0.2, 7.1.0, 7.1.1, 7.1.2, 7.2.0, 7.3.0, 7.3.1, 7.3.2


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters