Splunk Search

how to find search name based on error in splunkd.log?

OldManEd
Builder

I'm getting the following errors in my splunkd.log file a lot;

02-19-2014 10:10:58.232 -0800 WARN  FileClassifierManager - The file '/opt/splunk/var/spool/splunk/RMD596d1d44d452086c5_441184131.stash_new' is invalid. Reason: binary
02-19-2014 10:10:58.232 -0800 INFO  TailingProcessor - Ignoring file '/opt/splunk/var/spool/splunk/RMD596d1d44d452086c5_441184131.stash_new' due to: binary

From what I've read, this is a known bug, SPL-59578.

The "good" workaround is to reschedule the summary indexing and run a backfill to regenerate the corrupted files. But my question is, how do I get from "RMD596d1d44d452086c5" to a search name?

Tags (2)
0 Karma
1 Solution

somesoni2
Revered Legend

Try this search:

| rest /services/search/jobs | where LIKE(id,"%RMD596d1d44d452086c5%") | table label

View solution in original post

somesoni2
Revered Legend

Try this search:

| rest /services/search/jobs | where LIKE(id,"%RMD596d1d44d452086c5%") | table label

OldManEd
Builder

Somesoni2,
That did it. Thanks.

0 Karma
Get Updates on the Splunk Community!

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had 3 releases of new security content via the Enterprise Security ...

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...