Hi @bowesmana : I see the reset operation you have added. Do you know how we can do this in dashboard studio. I have two dropdowns. A & B. On selection of values in A, it displays relevant va...
See more...
Hi @bowesmana : I see the reset operation you have added. Do you know how we can do this in dashboard studio. I have two dropdowns. A & B. On selection of values in A, it displays relevant values in B. On changing selection in value A, dropdown B displays previous selection value first then listed with new selection values from A. Regards, PNV
Hi Splunker, I am currently working with REST API calls for user management in Splunk. While attempting to add additional roles to the default admin account, I accidentally removed the admin role fr...
See more...
Hi Splunker, I am currently working with REST API calls for user management in Splunk. While attempting to add additional roles to the default admin account, I accidentally removed the admin role from this account. Unfortunately, I do not have any other user accounts with admin privileges. At present, I only have a single user account with the "User" role and cannot create a new user with "Admin" privileges. Could you please advise on how to restore the deleted roles to the existing user account or suggest any alternative solutions?
I need to generate a report where it will output table with different timings in columns. Trick part is logs captured fall under a unique transaction ID index=<app> "Start Time" OR "End Time" ...
See more...
I need to generate a report where it will output table with different timings in columns. Trick part is logs captured fall under a unique transaction ID index=<app> "Start Time" OR "End Time" Sample Output Log (Note that this is under 1 transaction ID): 8:00 TransID "Start Time" 8:01 TransID "End Time" 8:30 TransID "Start Time" 8:31 TransID "End Time" 9:00 TransID "Start Time" 9:01 TransID "End Time" Table should look like: TransID StartTime1 EndTime1 Duration1 StartTime2 EndTime2 Duration 2 StartTime3 EndTime3 Duration3 0123 8:00 8:01 1:00 8:30 8:31 1:00 9:00 9:01 1:00
I am confused by what you are actually asking for. Let's say today is 8th August 2024 and the user enters 2023 for application version, are you wanting to compare two time periods, each 30 days prior...
See more...
I am confused by what you are actually asking for. Let's say today is 8th August 2024 and the user enters 2023 for application version, are you wanting to compare two time periods, each 30 days prior to 8th August, one for 2024 and the other for 2023. In those time periods, you want application version to be 2023 for the 2024 search and 2022 for the 2023 time period?
The %SPLUNK_HOME% variable that you noted in this documentation is not defined outside of the Splunk process by default. %SPLUNK_HOME% refers to the Splunk installation folder on Windows. Typically:...
See more...
The %SPLUNK_HOME% variable that you noted in this documentation is not defined outside of the Splunk process by default. %SPLUNK_HOME% refers to the Splunk installation folder on Windows. Typically: C:\Program Files\Splunk You can run all of those commands as the user running Splunk by either setting the environment variable or replacing it manually first. To permanently set the environment variable you can use: setx SPLUNK_HOME "C:\Program Files\Splunk" Read more here.
I am working on a tax product and we have products per tax year. Now I want to compare the performance of the tax products in a time chart and I did like below (This is in a splunk dashboard)
i...
See more...
I am working on a tax product and we have products per tax year. Now I want to compare the performance of the tax products in a time chart and I did like below (This is in a splunk dashboard)
index=cls_prod_app appname=Lacerte applicationversion=$applicationversion$ message="featureperfmetrics" NOT(isinternal="*") taxmodule=$taxmodule$ $hostingprovider$ datapath=* operation=createclient $concurrentusers$ latest=-365d@d
| append [
search index=cls_prod_app appname=Lacerte applicationversion=2022 message="featureperfmetrics" NOT(isinternal="*") taxmodule=$taxmodule$ $hostingprovider$ datapath=* operation=createclient $concurrentusers$ latest=-365d@d
]
| eval totaltimeinsec = totaltime/1000
| bin span=1m _time | timechart p95(totaltimeinsec) as RecordedTime by applicationversion limit=0
$applicationversion$ is user input and it will be 2023 or 2024 like this string. 1. I want to append a search if user type in 2023 then as 2022. tostring(tonumber($applicationversion$)-) is not working for me somehow. toint tells me it is not a valid methd 2. I want to plot this in special way, for example, if I search 2023 for last 30 days, actual 2022 real performance should be of last year data. What I need is if select 2023, last 30 days today on Aug,08-2024 then I want to compare last 30 days of 2023 and last years (Aug08, 2023)'s last 30 days data in a time chart to see the real graph for any deviation. Is there any way to achieve this in splunk?
I think I can see the issue here: [wineventlog_index_windows]
definition= index=wineventlog OR index=main This should be: [wineventlog_index_windows]
search = index=wineventlog OR index=m...
See more...
I think I can see the issue here: [wineventlog_index_windows]
definition= index=wineventlog OR index=main This should be: [wineventlog_index_windows]
search = index=wineventlog OR index=main Note the "search" directive instead of "definition". Definition is used in macros.conf. Let me know how you get on
Hi @vid1 , the installation procedure is at https://docs.splunk.com/Documentation/Forwarder/9.3.0/Forwarder/Installanixuniversalforwarder what message are you receiving? what do you find at /opt/s...
See more...
Hi @vid1 , the installation procedure is at https://docs.splunk.com/Documentation/Forwarder/9.3.0/Forwarder/Installanixuniversalforwarder what message are you receiving? what do you find at /opt/splunkforwarder/var/log/splunk firstinstall.log ? Ciao. giuseppe
Hi @Iris_Pi , you must send a diag to Splunk Support when you have on-premise systems because they cannot access them, but they can access Splunk Cloud so you don't need to create it. let me know i...
See more...
Hi @Iris_Pi , you must send a diag to Splunk Support when you have on-premise systems because they cannot access them, but they can access Splunk Cloud so you don't need to create it. let me know if I can help you more, or, please, accept one answer for the other people of Community. Ciao and happy splunking Giuseppe P.S.: Karma Points are appreciated
Hello Guys, Can you please share the steps on how to create diag file for **Splunk Cloud**? I found some posts saying that we can run "Splunk diag" from the command line, However there's no command...
See more...
Hello Guys, Can you please share the steps on how to create diag file for **Splunk Cloud**? I found some posts saying that we can run "Splunk diag" from the command line, However there's no command line for Splunk cloud, then how can I get a diag file as asked by support. Thanks much in advance! Regards, Iris
1) I would like to say thank you for your advice, I think I overlooked the main index. 2) The main reason what I want to split from one source type say test, into index=bank, index=card, index=erro...
See more...
1) I would like to say thank you for your advice, I think I overlooked the main index. 2) The main reason what I want to split from one source type say test, into index=bank, index=card, index=error is because I need to different access permissions.
Hi, We have already done that - deleted the smart agent on the host itself, but it's still there. The agent got wiped about 3 weeks ago when we were done testing. We are using: AppDynamics Contro...
See more...
Hi, We have already done that - deleted the smart agent on the host itself, but it's still there. The agent got wiped about 3 weeks ago when we were done testing. We are using: AppDynamics Controller build 24.2.6-1114
You can change the field name with the "rename" method, but what I wanted was for the desired field name to be searched when I searched with just index=botsv2 sourcetype="stream:smtp" ----...
See more...
You can change the field name with the "rename" method, but what I wanted was for the desired field name to be searched when I searched with just index=botsv2 sourcetype="stream:smtp" --------------------------------------------------------------------------------------------------------------------------------------------- index=botsv2 sourcetype="stream:smtp" attach_filename{}="*" (Before,, In order to extraact file_name, I had to search for that..) I took a hint from your words and solved it in a different way. Taking a hint that attach_filename{} was already extracted from splunk, I created a lookup-file using "spath" and made it "Auto-Lookup". Then, the field is now extracted and displayed with just index=botsv2 sourcetype="stream:smtp". I really appreciate your help. Thank You