Monitoring Splunk

Crashing thread: OneShotFileWriter

rroberts
Splunk Employee
Splunk Employee

Batch upload a diag : 5178152 2011-11-17 17:18 diag-ip-10-168-65-59-2011-11-17.tar.gz (not too big I don't think)
Splunkd crashed. Any Idea what may have caused the crash?

Crash log snippet indicates the OneShotFileWriter thread is the culprit but have no idea why.

[build 189883] 2014-02-24 15:34:15
Received fatal signal 6 (Aborted).
Cause:
Signal sent by PID 1972 running under UID 521.
Crashing thread: OneShotFileWriter
OS: Linux
Arch: x86-64

Backtrace:
[0x00002AAAABC01EC5] gsignal + 53 (/lib64/libc.so.6)
[0x00002AAAABC03970] abort + 272 (/lib64/libc.so.6)
[0x00002AAAABBFB11F] __assert_fail + 239 (/lib64/libc.so.6)
[0x0000000000B4505F] _ZN20PipelineInputChannel16addNumberedFieldERK10StrSegment + 159 (splunkd)
[0x00002AAAAF020F01] ?
Linux / ip-10-188-188-218 / 2.6.21.7-2.ec2.v1.2.fc8xen / #1 SMP Fri Nov 20 17:48:28 EST 2009 / x86_64
Last few lines of stderr (may contain info on assertion failure, but also could be old):

Splunk std err shows…
2014-02-24 10:45:22.405 -0500 splunkd started (build 189883)
Cannot open manifest file inside "/home/stu4/opt/splunk/var/lib/splunk/defaultdb/db/db_1311012880_1283850332_0/rawdata": No such file or directory
Cannot open manifest file inside "/home/stu4/opt/splunk/var/lib/splunk/defaultdb/db/db_1373425154_1373415809_2/rawdata": No such file or directory
splunkd: /opt/splunk/p4/splunk/branches/6.0.1/src/framework/PipelineInputChannel.cpp:706: void PipelineInputChannel::addNumberedField(const StrSegment&): Assertion `_refcnt == 1' failed.
2014-02-24 15:36:18.312 -0500 splunkd started (build 189883)
Cannot open manifest file inside "/home/stu4/opt/splunk/var/lib/splunk/23456/db/db_1393265100_1393265100_2/rawdata": No such file or directory

[stu4@ip-10-188-188-218 bin]$ ./splunk version
Splunk 6.0.1 (build 189883)

[root@ip-10-188-188-218 splunker]# uname -a
Linux ip-10-188-188-218 2.6.21.7-2.ec2.v1.2.fc8xen #1 SMP Fri Nov 20 17:48:28 EST 2009 x86_64 x86_64 x86_64 GNU/Linux

Tags (2)
0 Karma
1 Solution

rroberts
Splunk Employee
Splunk Employee

Problem seemed to go away after upgrading to 6.2! Woohoo!

View solution in original post

0 Karma

rroberts
Splunk Employee
Splunk Employee

Problem seemed to go away after upgrading to 6.2! Woohoo!

0 Karma

rroberts
Splunk Employee
Splunk Employee

It was a newly created index with nothing in it.

0 Karma

sowings
Splunk Employee
Splunk Employee

The manifest file in question is the one from the data bucket, not the top level manifest. Is that index (23456) healthy?

0 Karma

rroberts
Splunk Employee
Splunk Employee

And happened again today:
Signal sent by PID 1849 running under UID 514.
Crashing thread: OneShotFileWriter
Im running Splunk as UID 514, I created the diag as splunk admin (UID 514) . Then attempted to eat the diag via SplunkWeb.
The manifest file shows:
f 444 splunk splunk splunk/README-splunk.txt

d 755 splunk splunk splunk/bin

f 555 splunk splunk splunk/bin/bloom

f 555 splunk splunk splunk/bin/btool

f 555 splunk splunk splunk/bin/btprobe

0 Karma

rroberts
Splunk Employee
Splunk Employee

Happened again today. This time UID 526. Manifest file shows:

-r--r--r-- 1 instructor student 840213 Sep 2 16:57 splunk-6.1.1-207789-linux-2.6-x86_64-manifest

Splunk 6.1.1 by the way.

0 Karma

rroberts
Splunk Employee
Splunk Employee

Unfortunately this training instance is gone. I'll spin up a new one and see if I can recreate.

0 Karma

lukejadamec
Super Champion

Do the manifest files exist? Does user UID 521 have access to the manifest files?

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...