<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AI integration with Splunk- How can I encapsulate the token value example:  '$SourceCode_Tok$' ? in Security</title>
    <link>https://community.splunk.com/t5/Security/AI-integration-with-Splunk-How-can-I-encapsulate-the-token-value/m-p/643529#M16969</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am working on a project to integrate Splunk with a LLM model.&amp;nbsp; I have created an app that search vulnerabilities within source code and report back findings as well as the modified source code with the corrected findings.&lt;/P&gt;
&lt;P&gt;Now, here's my issue, it works for JavaScript, Java, PHP, and many others, but at the moment I upload Python or Simple XML, the system cannot process it as it is thinking is part of the actual dashboard code.&lt;BR /&gt;&lt;BR /&gt;My question is, how can I encapsulate the token value example:&amp;nbsp; '$SourceCode_Tok$' for the system to interpret it correctly as external code to be analyzed.&lt;/P&gt;
&lt;P&gt;Thank you all!&lt;/P&gt;</description>
    <pubDate>Wed, 17 May 2023 13:47:27 GMT</pubDate>
    <dc:creator>Marino25</dc:creator>
    <dc:date>2023-05-17T13:47:27Z</dc:date>
    <item>
      <title>AI integration with Splunk- How can I encapsulate the token value example:  '$SourceCode_Tok$' ?</title>
      <link>https://community.splunk.com/t5/Security/AI-integration-with-Splunk-How-can-I-encapsulate-the-token-value/m-p/643529#M16969</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am working on a project to integrate Splunk with a LLM model.&amp;nbsp; I have created an app that search vulnerabilities within source code and report back findings as well as the modified source code with the corrected findings.&lt;/P&gt;
&lt;P&gt;Now, here's my issue, it works for JavaScript, Java, PHP, and many others, but at the moment I upload Python or Simple XML, the system cannot process it as it is thinking is part of the actual dashboard code.&lt;BR /&gt;&lt;BR /&gt;My question is, how can I encapsulate the token value example:&amp;nbsp; '$SourceCode_Tok$' for the system to interpret it correctly as external code to be analyzed.&lt;/P&gt;
&lt;P&gt;Thank you all!&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 13:47:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/AI-integration-with-Splunk-How-can-I-encapsulate-the-token-value/m-p/643529#M16969</guid>
      <dc:creator>Marino25</dc:creator>
      <dc:date>2023-05-17T13:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: AI integration with Splunk- How can I encapsulate the token value example:  '$SourceCode_Tok$' ?</title>
      <link>https://community.splunk.com/t5/Security/AI-integration-with-Splunk-How-can-I-encapsulate-the-token-value/m-p/694718#M18027</link>
      <description>&lt;P&gt;I'm hoping you've found a solution. I'm working on a similar project where I created an app in splunk/etc/apps/my-app with a .py file in the bin folder and a .conf file in the default folder. Initially, when I ran the command &amp;lt;| mycommand "hello"&amp;gt; in Splunk, it outputted a response that I had hardcoded in my .py file. However, after updating the script to generate responses via a large language model, I started encountering the following error.&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV class=""&gt;Error in 'mycommand' command: External search command exited unexpectedly with non-zero error code 1.&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;The search job has failed due to an error. You may be able view the job in the&lt;SPAN&gt;&amp;nbsp;&lt;A class="" href="https://mv-gb03:8000/en-US/app/search/search?q=%7C%20userquery%20hi&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;workload_pool=&amp;amp;earliest=0&amp;amp;latest=&amp;amp;sid=1722358555.272#" target="_blank" rel="noopener"&gt;Job Inspector.&lt;BR /&gt;&lt;BR /&gt;Please help me with this.&amp;nbsp;&lt;BR /&gt;Thanks in advance&lt;BR /&gt;&lt;BR /&gt;#splunk #LLM's&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 30 Jul 2024 17:46:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/AI-integration-with-Splunk-How-can-I-encapsulate-the-token-value/m-p/694718#M18027</guid>
      <dc:creator>syaganti</dc:creator>
      <dc:date>2024-07-30T17:46:24Z</dc:date>
    </item>
  </channel>
</rss>

