Troubleshooting common errors

ESCU does not generate its own logs because the app leverages core features of the Splunk Platform.

Following are some common log files that you can use to identify issues that might appear to be ESCU-related but usually exist in the Splunk Platform:

  • splunkd.log
  • scheduler.log
  • splunkd_access.log

For more information on troubleshooting, see the product documentation:

  • If you use Splunk Enterprise Security, see the Splunk Enterprise Security Troubleshooting manual for additional troubleshooting information.
  • For search related issues on Splunk Enterprise, see the Search Troubleshooting Guide.
  • To confirm if there is data present for a search or if you must troubleshoot data model issues, see the Troubleshooting Datamodel manual.

Troubleshoot a specific threat detection use case

Follow these steps to troubleshoot a specific threat detection use case in Splunk Enterprise Security:

  1. Get a high-level understanding of what the detection is trying to accomplish.
    Each ESCU detection targets a specific detection use case. In some troubleshooting scenarios, this metadata can be useful. For more information, see the following resources in Splunk Documentation and Github repository.
  2. Confirm that the data source contains events by using search on data models.
    Each ESCU detection searches events in a data source.
  3. Ensure that events in a data source are correctly indexed by the Splunk Platform.
    Verify this by identifying the SPL for the detection and minimizing it to its simplest form to confirm that events exist. Certain ESCU detections rely on data models. For example, you can confirm if events are created in the following detection by reducing the search to the minimum time and removing every condition.

    as follows:

    Note: Not every detection uses data models but you can identify the conditions and remove them from the SPL search query.
  4. Review the configuration of the detection.
    Each ESCU detection is initially configured to run on a schedule to identify on-going threats and troubleshoot mis-configured or disabled alerts. You can find specific details about the detection such as name, the SPL query, the last time it was run, the next time it runs, the frequency of the schedule, and so on by going to Searches, Reports, and Alerts in the Splunk UI.