Hi @Moshe, Before Java 8, Oracle (and Sun prior to its acquisition) included a JDBC-ODBC bridge driver with Java for Windows. Java 7 support ended in 2022, and Splunk DB Connect support for Java 7 ...
See more...
Hi @Moshe, Before Java 8, Oracle (and Sun prior to its acquisition) included a JDBC-ODBC bridge driver with Java for Windows. Java 7 support ended in 2022, and Splunk DB Connect support for Java 7 ended many years ago. If no JDBC driver is available for your data source, you may be able to find a current JDBC-ODBC bridge solution from OpenText (formerly Micro Focus, which acquired Serena Software and Merant), CData, or another vendor. Those vendors may also sell a JDBC driver for your data source; however, not all JDBC drivers support the interfaces required by Splunk DB Connect. Which ODBC driver and/or database platform are you trying to query? A scripted input might be the easiest solution to your problem.
A problem I noticed is, the new token only gets a value when we change the origin token. That's to say, when we opened the dashboard, although the origin token has a default value, the new token is ...
See more...
A problem I noticed is, the new token only gets a value when we change the origin token. That's to say, when we opened the dashboard, although the origin token has a default value, the new token is null, thus the queries don't work. We'll see "Search is waiting for input "
|msats sum(count-error) as Failed where index=metrics_index by service errorNumber errortype Results: service errorNumber errortype Failed aaca 0 fail 8 aaca 10 pass 1000 ...
See more...
|msats sum(count-error) as Failed where index=metrics_index by service errorNumber errortype Results: service errorNumber errortype Failed aaca 0 fail 8 aaca 10 pass 1000 aaca 25 fail 290 aaca 120 fail 8 aaca 80 pass 800 aaca 200 fail 400 aaca 210 pass 22 aaca 500 fail 10 aaw 120 fail 8 aaw 80 pass 2000 aaw 200 fail 3 aaw 210 pass 56 aaw 500 fail 22 aaw 0 pass 0 www 0 fail 8 www 10 pass 1000 www 25 fail 290 www 120 fail 8 www 80 pass 800 www 200 fail 400 amb 500 fail 10 amb 120 fail 8 amb 80 pass 2000 amb 200 fail 3 amb 210 pass 56 amb 500 fail 22 amb 0 pass 0 asf 0 fail 8 asf 10 pass 1000 asf 0 pass 0 asf 0 fail 8 asf 10 pass 1000 But we want the output as shown below: We need only top 4 errornumber show up along with the failed count service errorNumber errortype Failed aaca 0 fail 2538 10 pass 25 fail 120 fail 80 pass 200 fail 210 pass 500 fail aaw 120 fail 2089 80 pass 200 fail 210 pass 500 fail 0 pass www 0 fail 2506 10 pass 25 fail 120 fail 80 pass 200 fail amb 500 fail 2099 120 fail 80 pass 200 fail 210 pass 500 fail 0 pass asf 0 fail 2016 10 pass 0 pass 0 fail 10 pass
Hi @joelsz, Using Splunk 9.1.0 I set up 3 dashboards: dash_a, dash_b, dash_c When you click a button it loads the corresponding dashboard, and that's all. I've added some starter CSS to pretty up...
See more...
Hi @joelsz, Using Splunk 9.1.0 I set up 3 dashboards: dash_a, dash_b, dash_c When you click a button it loads the corresponding dashboard, and that's all. I've added some starter CSS to pretty up the buttons: <form version="1.1" theme="light">
<label>Dash_C</label>
<fieldset submitButton="false">
<input id="linkToOtherDash" type="link" token="link_dash">
<label>View other Dashboard:</label>
<choice value="dash_a">Dashboard 1 ↗</choice>
<choice value="dash_b">Dashboard 2 ↗</choice>
<choice value="dash_c">Dashboard 3 ↗</choice>
<change>
<condition value="dash_a">
<link target="_blank">/app/search/dash_a</link>
</condition>
<condition value="dash_b">
<link target="_blank">/app/search/dash_b</link>
</condition>
<condition value="dash_c">
<link target="_blank">/app/search/dash_c</link>
</condition>
</change>
</input>
</fieldset>
<row><panel depends="$CSS$"><html><style>
.splunk-linklist{
width:fit-content!important;
}
.splunk-linklist button{
min-width: 120px;
}
.splunk-linklist button span{
-webkit-box-pack: left;
justify-content: left;
-webkit-box-align: left;
align-items: left;
}
.splunk-linklist button{
background-color: #dddddd82;
margin: 4px 2px 0px 0px;
transition: 0.3s;
}
.splunk-linklist button:hover {
background-color: #007abd!important;
color: white!important;
}
</style></html></panel>
</row>
</form> Note that if you click a button, then go back to the original dashboard and click edit then cancel, it will load the second dashboard again. If you want to avoid that then update the links and remove target="_blank" .
This question is too vague - yes, some auto-scaling can be done under certain circumstances, but whether is is possible for your usecase is yet to be determined. Perhaps you could share some sample e...
See more...
This question is too vague - yes, some auto-scaling can be done under certain circumstances, but whether is is possible for your usecase is yet to be determined. Perhaps you could share some sample events, the searches you are using and your current dashboard designs. Also, include what you have tried so far, and a mock up of what you would like it to look like (if possible).
Since your sample data doesn't show more than one host or user for each ip address, guessing that list would be useful to get what you needed was beyond my knowledge. Perhaps you could provide a more...
See more...
Since your sample data doesn't show more than one host or user for each ip address, guessing that list would be useful to get what you needed was beyond my knowledge. Perhaps you could provide a more representative example of the events you are dealing with next time so we might be able to suggest a suitable solution (hopefully avoiding memory issues if possible).
Hi @deepdive100., You can create the column name based on what the field "name" is set to using by: |makeresults
|eval sample="100"
|eval name=if(sample=100,"C",N/A)
|timechart max(sample) by name ...
See more...
Hi @deepdive100., You can create the column name based on what the field "name" is set to using by: |makeresults
|eval sample="100"
|eval name=if(sample=100,"C",N/A)
|timechart max(sample) by name This creates a table with columns: _time, C. If the values are less or more than 100, there'll be an additional column "N/A" If you have a dashboard and you want to pick which column is displayed, you could do something like: |makeresults
|eval sample="100"
|eval name=if(sample=100,"$DROPDOWN_TOKEN$",N/A)
|timechart max(sample) by name And set up an input that sets the token $DROPDOWN_TOKEN$.
Hi @PickleRick , sorry it was a typo erro
Are you sure you wanted old value of get as old_put? --- sorry it was a typo error
Also, you can just do your condition as | where command to find on...
See more...
Hi @PickleRick , sorry it was a typo erro
Are you sure you wanted old value of get as old_put? --- sorry it was a typo error
Also, you can just do your condition as | where command to find only those matching results. Then you'd trigger alert only if you had any results at all.-- soory I used where condition but it's not working
|Where getperct>50
|Where putperct>10
|Where deleteperct>80
I want to receive error even if any one condition match, but I am not getting
Can u pls help
I have a timechart that I want a column name to reflect a field name like how a variable or token would be used. ```Example```
|makeresults
|eval sample="100"
|eval name=if(sample=100,"C",N/A)...
See more...
I have a timechart that I want a column name to reflect a field name like how a variable or token would be used. ```Example```
|makeresults
|eval sample="100"
|eval name=if(sample=100,"C",N/A)
|timechart max(sample) as $name$
```Expected Outcome would by a timechart with column named "C"``` Is this possible?
Our team in is the same boat, we have to move our cluster off of RHEL7 to RHEL8. We also have to use the same IP addresses of the current peers to "mimic" the old instance to the new instance. Sin...
See more...
Our team in is the same boat, we have to move our cluster off of RHEL7 to RHEL8. We also have to use the same IP addresses of the current peers to "mimic" the old instance to the new instance. Since we have a multi-site cluster, we are going to take a peer from site1 down using splunk offline, then rsync the entire /opt/splunk dir to the new VM, ensure all network settings match and rejoin it to the cluster. Rinse and Repeat.. From the splunk docs, I'm confused on which step needs to happen first. @Glasses2 Which step did you perform first, did you install splunk rpm package on the new server? Or did you rsync the old instance to the new server first and then install splunk? -siemless
Hi Team, I extracted each webpage details which is dynamic based on the time range for one of our application. Is it possible to auto scale up/down the visualization panel (like single value) in the...
See more...
Hi Team, I extracted each webpage details which is dynamic based on the time range for one of our application. Is it possible to auto scale up/down the visualization panel (like single value) in the splunk dashboard based on the output of the splunk query? For example, if suppose dev team added/removed the webpage or functionality, the visualization panel should be created/deleted automatically. Thank you in advance.