All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

You might not be explicitly using summaries but it's quite probable that you're using datamodel acceleration. And that's nothing other than summaries built on datamodel contents for given indexes. Y... See more...
You might not be explicitly using summaries but it's quite probable that you're using datamodel acceleration. And that's nothing other than summaries built on datamodel contents for given indexes. You can read some basic info on summary replication here https://conf.splunk.com/files/2016/slides/replication-of-summary-data-in-indexer-cluster.pdf
OK. Let me jump in with some organizational stuff. 1. The Answers forum is not a free support service. It's a platform for users to exchange knowledge and help each other. So it's very useful if the... See more...
OK. Let me jump in with some organizational stuff. 1. The Answers forum is not a free support service. It's a platform for users to exchange knowledge and help each other. So it's very useful if the threads are appropriately named - it makes searching in the future way easier. 2. When you're creating a new thread and writing "I'm facing the same issue as you" what are you refering to? What issue? Who's facing? If you're refering to other issue reported elsewhere, post a link for reference. 3. Please provide as much info as you can to help people help you - for example, the information that your alerting used to work OK and suddenly stopped is a very important knowledge. You also posted the first - less important - line from the sendemail log - the next line should contain the actual error. And more to the point - if something used to work and doesn't do that anymore, something must have changed. If you're absolutely sure (and double-checked it) that nothing changed on your side - something must have changed in the environment your Splunk is located in. Maybe the mail server's settings have changed, maybe your organization's firewall policies changed. Maybe you need to authenticate when sending outgoing email and the user/password you're using is  no longer valid. Have you verify if you have connectivity to your configured email server from your search head? Did you try to manually connect to the server and initiate SMTP transaction? Did you get any errors?
@gilbertos Follow the instructions, I would request you to check the sourcetype.  sourcetype should match as per the add-on.     
Hi team,   Could you please help me on how to get health alert notification in phantom. Thanks in advance.   Regards, Harisha
Hi Team, Could you please help me on below requirement, how to make manual task approval without  approver login to the phantom. Thanks in advance Regards, Harisha
What happens if you manually use the sendemail command? | makeresults | sendemail to="it-security@durr.com" subject="Test mail" message="Test mail message"  
+1 with @TheLawsOfChaos, It's a common practise to create a Role with "Read Only" permission. You have any further questions / issues with respect to this @treven?
@gaurav10 Note that in @ITWhisperer 's solution, Event_Time is handled in 2 steps, with the binning in between: First, convert SUBMIT_TIME to a time field using strptime. Now you can bin based on a... See more...
@gaurav10 Note that in @ITWhisperer 's solution, Event_Time is handled in 2 steps, with the binning in between: First, convert SUBMIT_TIME to a time field using strptime. Now you can bin based on a time span. Do your binning in this in-between phase. Second, convert the new Event_Time to a string using strftime.
It seems that splunklib is trying to get the obsolete pycrypto library. Ideally you should configure it to use the Cryptography or pycrypodome library. There is an answer here how to change splunkli... See more...
It seems that splunklib is trying to get the obsolete pycrypto library. Ideally you should configure it to use the Cryptography or pycrypodome library. There is an answer here how to change splunklib to use pycryptodome: https://stackoverflow.com/questions/59104347/how-do-i-install-splunklib-for-python-3-7-on-windows In case that link goes down, here are the instructions: by Chris Chris Dec 2 2019, 8:42: I finally found the way to install it: Uninstall pycrypto pip uninstall pycrypto Install pycryptodome as replacement of pycypto pip install pycryptodome Install splunklib without dependencies pip install splunklib --no-deps Edit "pythonlib"\splunklib-1.0.0.dist-info\METADATA and replace "Requires-Dist: pycrypto" with "Requires-Dist: pycryptodome" install splunk-sdk pip install splunk-sdk check that everything is ok pip install splunklib  
Hi @bowesmana Thank for Answer! I checked balance as SPL that you gave to me. Balance looks like not bad.  I confirmed that the major indexes are counted as many as the number of indexers.  
Hi! @PickleRick Thank for Answer. I didn't know about primary, non-primary searchable copy terms until you said. In our operation environment, summary is rarely used. So, I think we need to collec... See more...
Hi! @PickleRick Thank for Answer. I didn't know about primary, non-primary searchable copy terms until you said. In our operation environment, summary is rarely used. So, I think we need to collect information about primary copy and find the cause. Thank you again!
Hello PickleRick, I he created data input o allow udp14 traffic. So is index. Please check these screenshots for clarity,  192.168.3.5 is Palo Device and 192.168.3.1 is windows machine where ... See more...
Hello PickleRick, I he created data input o allow udp14 traffic. So is index. Please check these screenshots for clarity,  192.168.3.5 is Palo Device and 192.168.3.1 is windows machine where Splunk is installed
Premium apps are associated with a specific account provided on a purchase order as far as I remember. Find the person responsible for this oder in your company or contact your local Splunk sales team.
Hi !  I want to try splunk UBA on a single linux machine.  But, on the app download page, I'm seeing error saying app installation is restricted to certain users and your user profile is not in that... See more...
Hi !  I want to try splunk UBA on a single linux machine.  But, on the app download page, I'm seeing error saying app installation is restricted to certain users and your user profile is not in that list. Any suggestions to resolve this ? Thanks, Abhishek
While @ITWhisperer 's response about the original data (and desired result) is valid, there is one important thing worth noting - with Splunk often the approach of "joining" separate searches is not ... See more...
While @ITWhisperer 's response about the original data (and desired result) is valid, there is one important thing worth noting - with Splunk often the approach of "joining" separate searches is not the best idea. The typical Splunk approach would be to search for all events in the initial search and then subsequently filter and split into separate categories further down the search pipeline.
It would help if you could share some sample anonymised events so we can see what it is that you are dealing with and try to figure a search that will work for you, because just discussing searches w... See more...
It would help if you could share some sample anonymised events so we can see what it is that you are dealing with and try to figure a search that will work for you, because just discussing searches without knowing what they apply to is often fruitless.
That doesn't appear to be what I recommended - perhaps that's why you are not getting any results? It would help if you could share some sample anonymised events so we can see what it is that you ar... See more...
That doesn't appear to be what I recommended - perhaps that's why you are not getting any results? It would help if you could share some sample anonymised events so we can see what it is that you are dealing with and try to figure a search that will work for you, because just discussing searches without knowing what they apply to is often fruitless.
Hi Team, I require merging three queries originating from the identical index and sourcetypes, yet each query necessitates extraction and manipulation of its output. Query 1: A single index is ... See more...
Hi Team, I require merging three queries originating from the identical index and sourcetypes, yet each query necessitates extraction and manipulation of its output. Query 1: A single index is linked to three unique sourcetypes. index = abc sourcetype= def, sourcetype=ghi & sourcetype=jkl Query 2 : Its same like Query 1  index = abc sourcetype= def, sourcetype=ghi & sourcetype=jkl Query 3: Its same like Query 1 & 2 index = abc sourcetype= def, sourcetype=ghi & sourcetype=jkl The index and sourcetype details remain consistent across all three queries, but the keywords differ. Thus, I aim to merge the three queries, compare them, and extract the desired output.   For instance, in the initial query, the "Step" field is extracted during the search process, containing diverse data such as computer names and OS information. In the second query, our aim is to ascertain the count of successful occurrences in the "Step" field, specifically the count of computer names indicating success. Likewise, in the third query, we intend to retrieve information regarding failures. Query1: index="abc" ("Restart transaction item" NOT "Pending : transaction item:") | rex field=_raw "Restart transaction item: (?<Step>.*?) \(WorkId:"| table Step |stats Count by Step Query 2: index="abc" ("Error restart workflow item:") | rex field=_raw "Error restart workflow item: (?<Success>.*?) \(WorkId:"| table Success |stats Count by Success Query 3: index="abc" "Restart Pending event from command," | rex field=_raw "Restart Pending event from command, (?<Failure>.*?) \Workid"| table Failure |stats Count by Failure Thus, in the initial query, the Step field is extracted, and our objective is to extract both success and failure data from this field, presenting it in a tabular format. Despite attempting to use a join query, it was unsuccessful. Assistance in this matter would be greatly appreciated. Kindly help on the same.
Wait a second. 9 out of 10 indexers have roughly the same number of buckets and 1 has just 1/3 of those? And this one has significantly larger buckets? That is strange. With ingestion imbalance a... See more...
Wait a second. 9 out of 10 indexers have roughly the same number of buckets and 1 has just 1/3 of those? And this one has significantly larger buckets? That is strange. With ingestion imbalance as a primary factor you should have one or a few indexers with bigger bucket count, not smaller. If you have larger buckets, I'd hazard a guess that: 1) You have primary buckets on that indexer (so you have some imbalance if this indexer receives all the primaries there) 2) The summaries are generated on that indexer (hence the increased size) 3) The summaries are not replicated between peers (if I remember correctly, replicating summaries must be explicitly enabled) So your indexer is overused because it has all the primaries and all summary-generating searches hit just this indexer. And probably due to size of the index(es) or the volume(s) your buckets might get frozen earlier than on other indexers.
I assume PAlto is sending events as syslog data. As you're using Windows I suspect you're not using any additional syslog receiver but want to receive syslog directly on your Splunk (which is not the... See more...
I assume PAlto is sending events as syslog data. As you're using Windows I suspect you're not using any additional syslog receiver but want to receive syslog directly on your Splunk (which is not the best idea but let's leave it for now). Have you configured any inputs on your Splunk instance to receive the syslog events? Do you have proper rules in your server's firewall to allow for this traffic?