All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Hi @bowesmana , It is a classic dashboard, and time range is one of  panel in the dashboard. I just used the below query for panel.  Customer has access to the dashboard but only timerange pane... See more...
Hi @bowesmana , It is a classic dashboard, and time range is one of  panel in the dashboard. I just used the below query for panel.  Customer has access to the dashboard but only timerange panel is showing error. <panel ref="TimeRangePanel"></panel> Below is the error  
Using streamstats is the more powerful solution and as @PickleRick says it can handle the case where you have multiple started and connected events for the same user. (Think reset_before=). The issu... See more...
Using streamstats is the more powerful solution and as @PickleRick says it can handle the case where you have multiple started and connected events for the same user. (Think reset_before=). The issue you need to consider is your data volume. transaction is not good with large data volumes and long spans and will not easily handle the multiple connected events and streamstats needs to move all the data to the search head. There is a 3rd solution using stats but it would need some good knowledge of playing around with multivalued fields.
Hello you have to upgrade either REHL 8 or  to support latest version of controller ,  Upgrading from RHEL 7 to RHEL 8 Red Hat Enterprise Linux 8 | Red Hat Customer Portal I recommend upgrading up ... See more...
Hello you have to upgrade either REHL 8 or  to support latest version of controller ,  Upgrading from RHEL 7 to RHEL 8 Red Hat Enterprise Linux 8 | Red Hat Customer Portal I recommend upgrading up to REHL 8.8 only then upgrade your controller and Event Service as ver:21.4  does not support REHL 9.x Regards
Hi @dtccsundar, if you want only one regex, you can use | rex "Interface\s+(?<interface>[^,]+), changed state to (?<state>\w+)" if you prefer two regexes, you can use: | rex "Interface\s+(?<inter... See more...
Hi @dtccsundar, if you want only one regex, you can use | rex "Interface\s+(?<interface>[^,]+), changed state to (?<state>\w+)" if you prefer two regexes, you can use: | rex "Interface\s+(?<interface>[^,]+)" | rex ""changed state to (?<state>\w+)" you can test the regx at https://regex101.com/r/WpmBG3/1 Ciao. Giuseppe
i have 2 requirements  1) From different events in need to extract the word after Interface  and Comma. After Interface there will be a space .Field name can be Interface 2) Need to extract a new f... See more...
i have 2 requirements  1) From different events in need to extract the word after Interface  and Comma. After Interface there will be a space .Field name can be Interface 2) Need to extract a new field with name Activity with values either Up or Down .I have marked in bold in the events . Ex-  1) Mar 5 05:45:43 ie-dub-corp-sw1 Eastern: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2/0/19, changed state to down 2) Mar 5 05:46:50 omenmnlswfl02 EST: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2/3, changed state to up Please help me with 2 regex .    
Hi @Nawab, you can disable the edit button and don't give grants to modify the view to the role used by these users. Ciao. Giuseppe
you may use the extension that support Redis Enterprise cluster Appdynamics/redis-enterprise-monitoring-extension - Cisco Code Exchange it will allow you to monitor the cluster overall
Hi Splunkers, for our customer we need to populate an external lookup. We are on a Splunk SaaS env. A colleague has developed a simple app to achieve this purpose. After some test, the lookup seems ... See more...
Hi Splunkers, for our customer we need to populate an external lookup. We are on a Splunk SaaS env. A colleague has developed a simple app to achieve this purpose. After some test, the lookup seems to be populated fine. Our current problem is: if we use this lookup in a search executed from Search and Reporting app, it return expected results. No issue, no missing data. But, if we try from another app able to execute a search (I mean, with search function available), on the same data set and time range, output is empty. We suspect it's related to a permission problem (may be the app has no permission to write on underlying file system, due we are in a cloud env?),  but we are not sure. Moreover, even if we are right how could be fix the issue? 
I can do that, but a use case modify the search and see all notables not related to him. how can i stop user to modify search
I am trying to create a popup that should open as soon as you click on the link of the dashbaord ...However on entering the html code I am getting the following error - "Entity 'times' not defined"  ... See more...
I am trying to create a popup that should open as soon as you click on the link of the dashbaord ...However on entering the html code I am getting the following error - "Entity 'times' not defined"  ...Can anyone please tell me how to fix this issue ? It is a bit urgent so a quick help would be appreciated a lot....and here is the tag : <span class="close">&times;</span> 
Hi @Nawab, ES isn't multitenant and you are asking how to use ES in multitenancy! you have to create a custom dashbord that accesses the Notable index, The real problem is how to profilate the use... See more...
Hi @Nawab, ES isn't multitenant and you are asking how to use ES in multitenancy! you have to create a custom dashbord that accesses the Notable index, The real problem is how to profilate the users, you could use e.g. sourcetype or another field in the Notable index. You should customize all the Correlation searches to write a field in the Notable index to identify notables for each users. Ciao. Giuseppe
Let suppose, we want to create a dashboard on notable index, which is shared with all team, but we want to create a dashboard for every team to see notables related to them.   But we want to restri... See more...
Let suppose, we want to create a dashboard on notable index, which is shared with all team, but we want to create a dashboard for every team to see notables related to them.   But we want to restrict them to only see this specific search and they can not even change the search when they click the search icon on the dashboard.   is it possible?   or how can we segregate notable in a single ES deployment?
As a side note - instead of index=my_index | stats max(_time) as latest_event_time You can use | tstats max(_time) as latest_event_time where index=my_index You will notice a _huge_ performance d... See more...
As a side note - instead of index=my_index | stats max(_time) as latest_event_time You can use | tstats max(_time) as latest_event_time where index=my_index You will notice a _huge_ performance difference.
I'm looking to run a |rest command to return a list of apps, and app versions sent from the management node (i.e.  manager-apps).  I'm only seeing an option that will return local apps (/opt/splunk/e... See more...
I'm looking to run a |rest command to return a list of apps, and app versions sent from the management node (i.e.  manager-apps).  I'm only seeing an option that will return local apps (/opt/splunk/etc/apps), nothing from /opt/splunk/etc/manager-apps. 
While transaction can be indeed a more intuitive solution, similar solution can be probably achieved with streamstats. First "split" your times to have it as | eval starttime=if(status=="started",_... See more...
While transaction can be indeed a more intuitive solution, similar solution can be probably achieved with streamstats. First "split" your times to have it as | eval starttime=if(status=="started",_time,null()) | eval endtime=if(status=="connected",_time,null()) Then you can "collect" your times with | streamstats min(starttime) as timestarted min(endtime) as timeended by userId If you now want to remove the "extra" events with "connected" status, you can do | where NOT (status=="connected" AND _time!=timeended) Bonus - you can use the same approach if there is a possibility of multiple "started" events (we'll leave it as an exercise for the reaer ;-)) Now you're left with just one "started" event and one "connected" event. So we're down to your last requirement - ther must be both "start" event and "connected" event. This can be done in various ways but we can do it along our duration calculation | stats range(_time) as duration values(state) as states by userId And we only want to keep those results which have both states | where states="started" AND states="connected" Now you're all set to group, summarize, bin, and do whatever you want with your results. To be quite honest, I'm not sure what you mean by your C) requirement. Because if it does what I think may mean, the above search is completely not what you want
Luckily, with auditd logs the order of the fields should not change so you can match the events to acct=appuser.*exe=/usr/(sbin/crond|bin/crontab) and just filter out (send to nullQueue) events mat... See more...
Luckily, with auditd logs the order of the fields should not change so you can match the events to acct=appuser.*exe=/usr/(sbin/crond|bin/crontab) and just filter out (send to nullQueue) events matching this regex.
As @bowesmana pointed out - _time is a field which holds the current timestamp expressed as a number (number of seconds since epoch). it only gets formatted on display by default in the WebUI - the _... See more...
As @bowesmana pointed out - _time is a field which holds the current timestamp expressed as a number (number of seconds since epoch). it only gets formatted on display by default in the WebUI - the _time field is treated specially - you can check it for yourself | makeresults | eval _time=0 If you render your _time to a string...  Honestly, I have no idea what will happen. Splunk will not use the value because it's not a number but whether it sets it to zero or treats the field as non-existant, I cannot tell. Anyway, the results will definitely not be what you expect.
Will this also dedup start and ending transactions as well?
@kate Can you check the inputs.conf in your add-on.  https://docs.splunk.com/Documentation/AddOns/released/UnixLinux/About#File_Monitoring_Inputs  https://docs.splunk.com/Documentation/AddOns/relea... See more...
@kate Can you check the inputs.conf in your add-on.  https://docs.splunk.com/Documentation/AddOns/released/UnixLinux/About#File_Monitoring_Inputs  https://docs.splunk.com/Documentation/AddOns/released/UnixLinux/About#Scripted_Inputs 
@pingli Hello, You can forward the data from your Commvault Metallic Saas Solution to Splunk using the API's or HEC tokens etc. Please find the below details for your reference.  https://www.splunk.... See more...
@pingli Hello, You can forward the data from your Commvault Metallic Saas Solution to Splunk using the API's or HEC tokens etc. Please find the below details for your reference.  https://www.splunk.com/en_us/blog/tips-and-tricks/getting-data-from-your-rest-apis-into-splunk.html?locale=en_us  https://docs.splunk.com/Documentation/SplunkCloud/latest/Data/UsetheHTTPEventCollector  https://dev.splunk.com/enterprise/docs/devtools/httpeventcollector/