All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Our Ubuntu VMs are not reporting disk I/O and other metrics, and the "Partition Metric Name" shows up as "Unknown".  Further investigation suggest that the disk stats section of "linux-stats.sh" has ... See more...
Our Ubuntu VMs are not reporting disk I/O and other metrics, and the "Partition Metric Name" shows up as "Unknown".  Further investigation suggest that the disk stats section of "linux-stats.sh" has a regex that requires the device to end in a number, whereas the / mount uses "/dev/root".  Is anyone aware of an updated script that work with the newer OS or has anyone been able to modify the script to correlate correctly?
@pm2012Try this. We can do it in multiple ways.          
@Ryan.Paredez  I would like to make the suggestion of versioning the appdynamics Python module to allow us to pass the Proxy and Watch dog log levels as environment variables. Thanks
Hi, I have the following Link List input to provide a shortcut to other dashboards, when any of them are selected it would open a new tab to the specified dashboard. The issue is that when a link is... See more...
Hi, I have the following Link List input to provide a shortcut to other dashboards, when any of them are selected it would open a new tab to the specified dashboard. The issue is that when a link is selected it's being added as a parameter to the url, so the next time the page is refreshed it would trigger an input "change" and will immediately open a new tab to the link. What would be the best way to trigger only when it was selected? I've tried adding <set> and <unset> the input token after the <link> tag so it should be removed from the url once the new tab was opened, but it had no effect. <input id="linkToOtherDash" type="link" token="link_dash"> <label>View other Dashboard:</label> <choice value="dash1">Dashboard 1 ↗</choice> <choice value="dash2">Dashboard 2 ↗</choice> <choice value="dash3">Dashboard 3 ↗</choice> <change> <condition value="dash1"> <link target="_blank">https://example.com/dash1</link> <set token="link_dash">.</set> </condition> <condition value="dash2"> <link target="_blank">https://example.com/dash1</link> <set token="link_dash">.</set> </condition> <condition value="dash3"> <link target="_blank">https://example.com/dash1</link> <set token="link_dash">.</set> </condition> </change> </input>  
@sahityasweety  Check the Job Inspector. In the Inspector popup window, there is another link to the search.log that gives you some very detailed information. Another way to see more info about your... See more...
@sahityasweety  Check the Job Inspector. In the Inspector popup window, there is another link to the search.log that gives you some very detailed information. Another way to see more info about your errors is to open a plain search window and do a search like: index=_internal error Review your search query to ensure it is correctly formulated. Check for any typos, missing keywords, or syntax errors. Verify that the time range specified in your search covers the relevant data. Ensure that you are searching within the appropriate indexes. Check the Splunk logs (such as splunkd.log and search.log) for any errors or warnings related to your search. https://lantern.splunk.com/Splunk_Platform/Product_Tips/Searching_and_Reporting/Troubleshooting_and_investigating_searches https://docs.splunk.com/Documentation/SplunkCloud/9.1.2312/Search/ViewsearchjobpropertieswiththeJobInspector If this reply helps you, Karma would be appreciated.
OracleRequestId is empty because your eval doesn't take into account that ImpConReqId is not present in some of your events - either use fillnull on this field or modify the eval to take care when th... See more...
OracleRequestId is empty because your eval doesn't take into account that ImpConReqId is not present in some of your events - either use fillnull on this field or modify the eval to take care when this field is null
Did you run the search again and get the same message?  If so, what did you find in search.log?
I am getting this error, may have returned partial results try running your search again.if you see this error repeatedly, review search.log for details or contact your Splunk administration Can i ... See more...
I am getting this error, may have returned partial results try running your search again.if you see this error repeatedly, review search.log for details or contact your Splunk administration Can i please get solution for this     Thanks, sahitya
Ah, backups.  Splunk has this documented, so I'll just point you to their docs on "Backup and restore Splunk DB Connect version 3.10.0 or higher" Hope that helps! -Rich
Excellent point.  My answer should use list rather than values.
I used this search and it did work, however, something that I probably should have mentioned earlier is that multiple hosts and users are linked to the same external ip, so I am now getting multivalu... See more...
I used this search and it did work, however, something that I probably should have mentioned earlier is that multiple hosts and users are linked to the same external ip, so I am now getting multivalue fields for the Hostnames and Users. Anything that can be done for that? Or should I combine the two fields beforehand, then split them after the eventstats command?
Thank you for the response! I had a try like this (maybe not exactly the same) before posting, and it didn't work. However, this time I pasted yours and after a slight change, it works! Now it's ... See more...
Thank you for the response! I had a try like this (maybe not exactly the same) before posting, and it didn't work. However, this time I pasted yours and after a slight change, it works! Now it's like: if(SDLC=="pm","ctpm",SDLC) So it seems I cannot use $ and quotes. After removing them, it's good!
Hi Guys, I want to show two field values into single column in a table .query and sample logs given below.   index="mulesoft" applicationName="api" |spath content.payload{} |mvexpand content.pay... See more...
Hi Guys, I want to show two field values into single column in a table .query and sample logs given below.   index="mulesoft" applicationName="api" |spath content.payload{} |mvexpand content.payload{}| transaction correlationId | rename "content.payload{}.AP Import flow processing results{}.requestID" as RequestID "content.payload{}.GL Import flow processing results{}.impConReqId" as ImpConReqId content.payload{} as response | eval OracleRequestId="RequestID: ".RequestID." ImpConReqId: ".ImpConReqId|table response OracleRequestId   Actual Result response        OracleRequestId GL Import flow related results : Extract has no GL records to Import into Oracle { "AP Import flow processing results" : [ { "concurBatchId" : "395", "requestID" : "101660728", "returnMessage" : null, "returnStatus" : "SUCCESS", "insertCount" : "72", "fileName" : "CONCUR_APAC_APINV_1711965640.csv" } ] }   { "AP Import flow processing results" : [ { "concurBatchId" : "393", "requestID" : "101572722", "returnMessage" : null, "returnStatus" : "SUCCESS", "insertCount" : "66", "fileName" : "CONCUR_APAC_APINV_1711620043.csv" } ] } { "GL Import flow processing results" : [ { "concurBatchId" : "393", "batchId" : "6409", "count" : "5", "impConReqId" : "101572713", "errorMessage" : null, "filename" : "CONCUR_APAC_GLJE_51711620043.csv" } ] } RequestID: 101572722 ImpConReqId: 101572713   Expected Result: response        OracleRequestId GL Import flow related results : Extract has no GL records to Import into Oracle { "AP Import flow processing results" : [ { "concurBatchId" : "395", "requestID" : "101660728", "returnMessage" : null, "returnStatus" : "SUCCESS", "insertCount" : "72", "fileName" : "CONCUR_APAC_APINV_1711965640.csv" } ] } requestID:101660728 { "AP Import flow processing results" : [ { "concurBatchId" : "393", "requestID" : "101572722", "returnMessage" : null, "returnStatus" : "SUCCESS", "insertCount" : "66", "fileName" : "CONCUR_APAC_APINV_1711620043.csv" } ] } { "GL Import flow processing results" : [ { "concurBatchId" : "393", "batchId" : "6409", "count" : "5", "impConReqId" : "101572713", "errorMessage" : null, "filename" : "CONCUR_APAC_GLJE_51711620043.csv" } ] } RequestID: 101572722 ImpConReqId: 101572713  
Hi @dondef , I know it is a couple years later but for someone that might need this I enable the Splunk integration manually and that worked successfully.  I would try to enable manually via the cur... See more...
Hi @dondef , I know it is a couple years later but for someone that might need this I enable the Splunk integration manually and that worked successfully.  I would try to enable manually via the curl call.  https://www.bitdefender.com/business/support/en/77211-171475-splunk.html  
The problem with using values() is that the multivalue fields are each sorted lexicographically independently and the original relationship between the values from the events is lost before the mvzip... See more...
The problem with using values() is that the multivalue fields are each sorted lexicographically independently and the original relationship between the values from the events is lost before the mvzip/mvexpand/mvindex fixup.
Try something like this <change> <eval token="new_sdlc">if("$SDLC$"=="sldc","ctpm","$SDLC$")</eval> </change>
The mvexpand command will split the multi-value fields into separate events.  The problem is doing so breaks the relationships with other multi-value fields.  To work around that, combine the three m... See more...
The mvexpand command will split the multi-value fields into separate events.  The problem is doing so breaks the relationships with other multi-value fields.  To work around that, combine the three multi-value fields into a single multi-value field, use mvexpand, then split the fields apart. | rename jsonevent.external_ip as exip | rename aip as agentip | eval external_ip = coalesce(agentip, exip) | stats values(jsonevent.hostname) as Hostnames, values(jsonevent.Username) as Users, values(AppVendor) as Vendors, values(AppName) as Applications, values(AppVersion) as Version by external_ip | eval tuple=mvzip(Hostnames, mvzip(Usernames, mvzip(Vendors, mvzip(Applications, Version)))) | mvexpand tuple | eval tuple=split(tuple, ",") | eval Hostnames=mvindex(tuple, 0), Usernames=mvindex(tuple, 1), Vendors=mvindex(tuple, 2), Applications=mvindex(tuple, 3),Version=mvindex(tuple, 4)
Try something like this (index=index1 sourcetype=sourcetype1) OR (index=index2 sourcetype=sourcetype2) | rename jsonevent.external_ip as exip | rename aip as agentip | eval external_ip = coalesce(a... See more...
Try something like this (index=index1 sourcetype=sourcetype1) OR (index=index2 sourcetype=sourcetype2) | rename jsonevent.external_ip as exip | rename aip as agentip | eval external_ip = coalesce(agentip, exip) | eventstats values(jsonevent.hostname) as Hostnames, values(jsonevent.Username) as Usernames by external_ip | rename AppVendor as Vendors, AppName as Applications, AppVersion as Version | where isnotnull(Vendors) | table external_ip Hostnames Usernames Vendors Applications Version
Hi @Felipe.Windmoller, Thanks so much for following up with all this additional information! 
I have this query (below): 1) When I run this query in Splunk web, I get back SID and get data using SID. 2) When I use curl command, I get back SID and get data using SID. 3) But when I use Py... See more...
I have this query (below): 1) When I run this query in Splunk web, I get back SID and get data using SID. 2) When I use curl command, I get back SID and get data using SID. 3) But when I use Python, I get SID in the response with status code 201. #read this query from file   with open("aquery2.txt", "r") as f: aQuery = f.read() ##derive earliest and latest finalAQuery=("search" + " " +("earliest=" + "1711982700.001" + "=" + ("latest=" + 1711983600.0 + " " + aQuery)   url = "https://abc.splunkcloud.com:8089/servicesAB/-/xyz/search/jobs" def getSid(): try:   response = requests.post(url, headers={'Authorization': TOKEN}, data={'search': finalAQuery}, verify=False)   I get back the SID. But when I use the SID to get the results, I get error 404, <Response [404]> {"messages":[{"type":"FATAL","text":"Unknown endpoint."}]} def getMetric(): try:   getData=(url + '/' + sid + '/results') getSidResponse = requests.get(getData, headers={'Authorization': TOKEN}, data={'output_mode' : 'json'}, verify=False)   #aquery.txt contents below.   index=apigee sourcetype="apigee:Prod_access_logs" | rex field=proxyUri "(?P<proxyUri>(([a-zA-Z]+)\d)(?:\d\/[a-zA-Z]+|\/[a-zA-Z]+)+)" | convert num("requestTimeinSec") |rex field=_raw "(?<timeStamp>\d{4}\-\d{1,2}\-\d{1,2}T\d{1,2}\:\d{1,2}\:\d{1,2}\-\d{1,2}\:\d{1,2})\s+(?<hostValue>\w+)\s+\S+\s+\S+\s+(?<requestTimeinSec>\S+)\s+\-\s+-\s+(?P<httpStatusCode>\w+)\s+(?<upstreamHttpStatusCode>\w+)\s+\w+\s+\w+\s+(?<methodName>\w+)\s+(?<proxyUri>\S+)\s+(?<httpVersion>\S+)\s+(?<messageId>\S+)" |rex field=_raw "^([^\t]+\t){35}(?P<ClientId>[^\t]+)" | eval totalResponseTime=round(requestTimeinSec*1000) | replace "z1/credit/bank/info/usa" with "x1/credit/bank/info/canada" in proxyUri | replace "v1/taste" with "/connecticut/taste/v1/newyork" in proxyUri | rangemap field="httpStatusCode" "httpStatusCode"=0-499 | rename range as RangeSuccesshttpStatusCode | eval Product=case(like(ClientId, "JERSEY"), "aaa", like(ClientId, "APPLE"), "bbb", like(ClientId, "HELLO"), "ccc") | eval ATier=case((like(proxyUri,"/paypal/jersey/v1/newyork") AND like(methodName,"POST") AND IN (Product, "aaa", "bbb", "ccc")) , "Tier1", (like(proxyUri,"v1/credit/bank/info/canada") AND like(methodName,"GET") AND IN (Product, "aaa", "bbb", "ccc")) OR (like(proxyUri,"v1/credit/accounts/profile") AND like(methodName,"GET") AND IN (Product, "Venmo", "Cobrand", "PPC")), "Tier2",(like(proxyUri,"v1/alerts/preferences") AND like(methodName,"GET") AND IN (Product, "Venmo", "Cobrand", "PPC")), "Tier3",1==1,"NA") | stats count(totalResponseTime) as TotalTrans, count(eval(RangeSuccesshttpStatusCode="httpStatusCode")) as TotalSuccesTran, count(eval(httpStatusCode<500)) as GoodEvents, by ATier Product proxyUri methodName | where ((Product IN ("aaa", "bbb", "ccc")) AND (ATier IN ("Tier1", "Tier2","Tier3"))) |rename methodName AS Method | fields ATier proxyUri Method TotalTrans GoodEvents