All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

FWIW, the appendcols command rarely factors into a solution.  The conditions for it to work correctly are to narrow. The general form to solve a problem like this is to search the index for field va... See more...
FWIW, the appendcols command rarely factors into a solution.  The conditions for it to work correctly are to narrow. The general form to solve a problem like this is to search the index for field values that are not in the lookup table. index=prod_syslogfarm NOT [ | inputlookup myinventory.csv IP_Address | fields IP_Address | format ] | stats count by IP_Address | lookup myinventory.csv IP_Address OUTPUT Hostname Environment Tier3 Operating_System | rename Hostname as missingname | table missingname Environment Tier3 Operating_System
We need more information. What version of Splunk is the forwarder?  Is it a Universal Forwarder or Heavy Forwarder? What version of Splunk is the Deployment Server?  (FTR, the DS does not push conf... See more...
We need more information. What version of Splunk is the forwarder?  Is it a Universal Forwarder or Heavy Forwarder? What version of Splunk is the Deployment Server?  (FTR, the DS does not push configurations - forwarders pull them from the DS.) What error messages are in the forwarder's splunkd.log file?
Hi @richgalloway  In splunk search head, I installed o365 app. But when I restart Splunk, the app is disappearing. can u plz help...
Can someone help me understand what I am doing wrong here?   My requirement is I have a index=prod_syslogfarm which will report on the devices forwarding logs to the syslog collectors.  The devices... See more...
Can someone help me understand what I am doing wrong here?   My requirement is I have a index=prod_syslogfarm which will report on the devices forwarding logs to the syslog collectors.  The devices may report with either hostname / IP address / fqdn.  Now, I have to compare this with our master asset inventory (which is the lookup below myinventory.csv) and create a report with the host names that are not seen in prod_syslogfarm index.  I am making hostname as common field for the main search and the lookup file and below is my query.    Below query is not working as the report contains the hostnames that are there in the syslogfarm index. index=prod_syslogfarm | stats count by IP_Address | lookup myinventory.csv IP_Address OUTPUT Hostname | table IP_Address Hostname | rename Hostname as Reporting_Host | appendcols [ search index=prod_syslogfarm | eval fqdn_hostname=lower(fqdn_hostname) | eval Reporting_Host=lower(Reporting_Host) | eval Reporting_Host=mvappend(Reporting_Host, fqdn_hostname) ] | dedup Reporting_Host | table Reporting_Host | rename Reporting_Host as Hostname | appendcols [inputlookup myinventory.csv | eval Hostname=lower(Hostname) | stats values(Hostname) as cmdb_hostname by Hostname ] | eval missingname = mvmap(cmdb_hostname, if(cmdb_hostname != Hostname, cmdb_hostname, null())) | table missingname | mvexpand missingname | lookup myinventory.csv Hostname as missingname OUTPUT Environment Tier3 Operating_System | table missingname Environment Tier3 Operating_System
Hi Team, my CSV file contains a field like bellow (1st line in CSV) How can i create transformation for field extraction  "State","Location name","Primary Number" its retrieving a field state an... See more...
Hi Team, my CSV file contains a field like bellow (1st line in CSV) How can i create transformation for field extraction  "State","Location name","Primary Number" its retrieving a field state and Location Expected Fields: State Location name Primary Number
  After Splunk Forwarder installation deployment server is not able to push the configuration to the forwarder or the forwarder is not able to communicate with splunk ... See more...
  After Splunk Forwarder installation deployment server is not able to push the configuration to the forwarder or the forwarder is not able to communicate with splunk      
Hello everyone, I want the Kerio Control technical guide that provides details on how to set up and configure a Syslog server to send logs to Splunk log management systems.
Hello,  I have a table in a dashboard like so  User ID1 ID2 A ABC 123 B DEF 456 C GHJ 789   I have set a dilldown token like so <set token="id1... See more...
Hello,  I have a table in a dashboard like so  User ID1 ID2 A ABC 123 B DEF 456 C GHJ 789   I have set a dilldown token like so <set token="id1">$row.ID1$</set> <set token="id1">$row.ID1$</set> I have a below table that I want to pass these token down. For example, when I click at ABC at ID1, it will pass the token id1 aka value "ABC" to below query, when I click at 456 at ID2  it will pass the token id2 aka value "456" to below query.  The query will be  index=myindex $id1$ (if I click on a value in ID1 column) or index=myindex $id2$ (if I click on a value in ID2 column) I push in the right direction would be very appriciated.  Thank you
Hi All,   I recently found out that my Syslog Server is creating duplicates for all log files. I checked the packets ´pcap´ from one host and it contains unique logs but syslog has duplicates. Ho... See more...
Hi All,   I recently found out that my Syslog Server is creating duplicates for all log files. I checked the packets ´pcap´ from one host and it contains unique logs but syslog has duplicates. How do I prevent syslog from creating duplicate logs? Is there a way to prevent Splunk from ingesting duplicate logs? #syslog #linux #duplicates 
Hi @seyongkim, Splunk MLTK 5.1.3 is compatible with Splunk Enterprise 8.0.0 or higher, or Splunk Cloud Platform. https://docs.splunk.com/Documentation/MLApp/5.3.1/User/Installandconfigure#Requirem... See more...
Hi @seyongkim, Splunk MLTK 5.1.3 is compatible with Splunk Enterprise 8.0.0 or higher, or Splunk Cloud Platform. https://docs.splunk.com/Documentation/MLApp/5.3.1/User/Installandconfigure#Requirements
Macro expansion is just textual, there is no context held during expansion, so the expansion doesn't interpret any values passed to the macro, it simply replaces the text of the macro "call" with the... See more...
Macro expansion is just textual, there is no context held during expansion, so the expansion doesn't interpret any values passed to the macro, it simply replaces the text of the macro "call" with the body of the macro substituting parameters as it goes, then tries to expand any macros which have been added, and so on.
Hello, We attempted to upgrade Splunk OTEL on the cluster using the helm3 upgrade command, but encountered the following error.       Error: UPGRADE FAILED: parse error at (splunk-otel-collector... See more...
Hello, We attempted to upgrade Splunk OTEL on the cluster using the helm3 upgrade command, but encountered the following error.       Error: UPGRADE FAILED: parse error at (splunk-otel-collector/templates/operator/_helpers.tpl:8): unclosed action        
I want to know if the Splunk Machine Learning Toolkit 5.3.1 version is compatible with Splunk 9.1.3 Splunk Machine Learning Toolkit 
@anglewwb35- I'm not sure what kind of integration are you trying to do. But here is the references for Splunk API, which I hope will help you build the integration.   https://docs.splunk.com/Docum... See more...
@anglewwb35- I'm not sure what kind of integration are you trying to do. But here is the references for Splunk API, which I hope will help you build the integration.   https://docs.splunk.com/Documentation/Splunk/9.2.1/RESTUM/RESTusing https://docs.splunk.com/Documentation/Splunk/9.2.1/RESTREF/RESTprolog
@ivarny- I'm able to access the Doc, not sure what's wrong your machine. Try a different browser maybe.
@egt- This is not complete stack-trace to provide the information what is the root cause of this error. Regarding the slowness of the system, it all usually boils down to machines capability. Please... See more...
@egt- This is not complete stack-trace to provide the information what is the root cause of this error. Regarding the slowness of the system, it all usually boils down to machines capability. Please check the resource availability of the system - CPU, Memory, Network   I hope this helps!!!
@umeshchandra- Even though you are using SAML authentication, you can still create a local Splunk service account (with right read-only permissions) for this job. And it should do the job for your us... See more...
@umeshchandra- Even though you are using SAML authentication, you can still create a local Splunk service account (with right read-only permissions) for this job. And it should do the job for your use-case.   I hope this helps!!!
@sputre- The Add-on documentation describes the API - https://docs.splunk.com/Documentation/AddOns/released/NetApp/Lookups (But I personally have no experience with it)   I hope this helps!!!
@BisHop1020- Are you talking about this add-on - https://splunkbase.splunk.com/app/6135 This App is archived and I would not recommend using it.   If purpose of using this Add-on is to collect dat... See more...
@BisHop1020- Are you talking about this add-on - https://splunkbase.splunk.com/app/6135 This App is archived and I would not recommend using it.   If purpose of using this Add-on is to collect data from Jamf pro? Is so, then you can use - https://splunkbase.splunk.com/app/4729   I hope this helps!!!
@nsxlogging- I know Splunkbase was under maintenance recently. Try again and if the issue persist then you can contact splunkbase-admin@splunk.com.   I hope this helps!!!