Getting Data In

When modifying serverclass.conf, which safeguards could help us avoid the following mistakes?

ddrillic
Ultra Champion

The constantly updated serverclass.confhere creates all kinds of commotion. Today it was realized that we have the following:

[serverClass:<name>]
whiteline.0 = <host1>
whiteline.1 = <host2>
whiteline.2 = <host3>
whiteline.3 = <host4>
whiteline.4 = <host5>
....

Meaning, whitelist was written as whiteline by mistake. So, which safeguards we can put in place to avoid these mistakes/commotions?

0 Karma
1 Solution

harsmarvania57
Ultra Champion

Hi @ddrillic,

You can use btool, please refer this document http://docs.splunk.com/Documentation/Splunk/7.1.3/Troubleshooting/CommandlinetoolsforusewithSupport

Check for typos: ./splunk cmd btool check

View solution in original post

0 Karma

harsmarvania57
Ultra Champion

Hi @ddrillic,

You can use btool, please refer this document http://docs.splunk.com/Documentation/Splunk/7.1.3/Troubleshooting/CommandlinetoolsforusewithSupport

Check for typos: ./splunk cmd btool check
0 Karma

ddrillic
Ultra Champion

Gorgeous @harsmarvania57!

$ ./splunk cmd btool check

                Invalid key in stanza [serverClass:<class>] in /opt/splunk/etc/system/local/serverclass.conf, line 21: whiteline.0
0 Karma

ddrillic
Ultra Champion

Interestingly, it doesn't catch something like -

whitelist.92 = <host>
whitelist.93 = <host>
whitelist.94 = <host>
whitelist.95 = <host>
# number repetition 
whitelist.92 = <host>
whitelist.93 = <host>
0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...