All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Hi Have you look this doc https://docs.splunk.com/Documentation/Splunk/9.2.0/InheritedDeployment/Introduction ? r. Smo
Have you updated your automation yet to handle this? I can see the puppet module hasnt been updated since 2022.
Just look from _internal index have your peer connection to LM or have it license installed locally.
There are old answers how to roll it from hot to warm.
In most cases you could see those on MC or querying from internal logs.
When you have more than two nodes in one site, it’s not needed that all nodes have exactly same amount of buckets. Actually it’s almost normal situation that those are different when you have more nod... See more...
When you have more than two nodes in one site, it’s not needed that all nodes have exactly same amount of buckets. Actually it’s almost normal situation that those are different when you have more nodes than your RF is.
Hi Have you looked from mongod.log (or something similar) why mongod didn’t start? r. Ismo
This seems to be a bug on that dashboard. There shouldn’t be any fixed days, instead it should offer time picker for you to select needed time span and then use it. Probably the easiest way is just cr... See more...
This seems to be a bug on that dashboard. There shouldn’t be any fixed days, instead it should offer time picker for you to select needed time span and then use it. Probably the easiest way is just create your own dashboard with time picker and fix it that way? Please create also an support case for it as Splunk should have a dashboard which shows that statistics based n their current license policy/model.
One comment. User creation happened just when installing with package manager. If you are using tar package you must do those user by yourself if you want to use those.
I can have the result with 60 days without changing index retention. I do not know why. But I have to change the -30 days to -60 days in Splunk-owned form that does not allow editing. Guess I w... See more...
I can have the result with 60 days without changing index retention. I do not know why. But I have to change the -30 days to -60 days in Splunk-owned form that does not allow editing. Guess I will keep this in mind and see if Splunk will change any thing in the coming versions. best regards Altin
Hi @jeradb, you could use a regex, not an eval command like the following: | rex "User Name: (?<User_Name>[^ \n]+)" you can test this regex at https://regex101.com/r/gJ0I26/1 But only one questio... See more...
Hi @jeradb, you could use a regex, not an eval command like the following: | rex "User Name: (?<User_Name>[^ \n]+)" you can test this regex at https://regex101.com/r/gJ0I26/1 But only one question: did you installed the Splunk_TA_Windows (https://splunkbase.splunk.com/app/742)? using this add-on you should already have this field extracted without using a custom regex. Ciao. Giuseppe
LogName=Application EventCode=1004 EventType=4 ComputerName=Test.local User=NOT_TRANSLATED Sid=S-1-5-21-2704069758-3089908202-2921546158-1104 SidType=0 SourceName=RoxioBurn Type=Information RecordNum... See more...
LogName=Application EventCode=1004 EventType=4 ComputerName=Test.local User=NOT_TRANSLATED Sid=S-1-5-21-2704069758-3089908202-2921546158-1104 SidType=0 SourceName=RoxioBurn Type=Information RecordNumber=16834 Keywords=Classic TaskCategory=Optical Disc OpCode=Info Message=Date: Wed Feb 28 14:22:59 2024 Computer Name: COM-HV01 User Name: Test\test.user Writing is completed on drive (E:). Project includes 0 folder(s) and 1 file(s). Volume Label: 2024-02-28 Volume SN: 0 Volume ID: \??\Volume{b282bf1c-3dde-11ed-b48e-806e6f6e6963} Type: Unknown Status Of Media: Appendable,Blank,Closed session Files: C:\ProgramData\Roxio Log Files\Test.test.user_20240228142142.txt SHA1: 7c347a6724dcd243d396f9bb5e560142f26b8aa4 File System: None Disc Number: 1 Encryption: Yes User Password: Yes Spanned Set: No Data Size On Disc Set: 511 Bytes Network Volume: No   How would I write an eval command to extract User Name: without domain, Status of Media, Data size on disc set, and files from the field Message?  
When trying to run the ML demos on my Macbook M2 running Splunk in a docker env I get the following error in the middle of the display: Error in 'fit' command: Failed to find Python for Scientific... See more...
When trying to run the ML demos on my Macbook M2 running Splunk in a docker env I get the following error in the middle of the display: Error in 'fit' command: Failed to find Python for Scientific Computing Add-on (Splunk_SA_Scientific_Python_linux_x86_64) After having installed both Linux x64 (yes it also runs fast in Rosetta 2) + the mac_Silicon one and restarted the server, the error still remains. Any help appreciated Thank you
Hi @Nawab , good for you, see next time! Ciao and happy splunking Giuseppe P.S.: Karma Points are appreciated by all the contributors
Yes, I can help, but it's also in the manual. | multikv forceheader=1
I don't know which third-party software offers that counter, if it's even available at all.
this works fro me
@Nawab , Please try below : https://docs.splunk.com/Documentation/ES/7.3.0/Admin/CustomizeIR In the Splunk Enterprise Security app, select Configure. Select General and then select General Settings... See more...
@Nawab , Please try below : https://docs.splunk.com/Documentation/ES/7.3.0/Admin/CustomizeIR In the Splunk Enterprise Security app, select Configure. Select General and then select General Settings. Go to Enhanced Incident Review workflow panel. Select Turn off.
When I navigate to Settings > Tokens, I get this error message:   KVStore is not ready. Token auth system will not work.   Splunk logs shows this:   ERROR JsonWebToken [233289 TcpChannelThread]... See more...
When I navigate to Settings > Tokens, I get this error message:   KVStore is not ready. Token auth system will not work.   Splunk logs shows this:   ERROR JsonWebToken [233289 TcpChannelThread] - KVStore is not ready. Token auth system will not work. ERROR KVStoreConfigurationProvider [233052 KVStoreConfigurationThread] - Failed to start mongod on first attempt reason=KVStore service will not start because kvstore process terminated ERROR KVStoreBulletinBoardManager [233053 MongodLogThread] - KV Store changed status to failed. KVStore process terminated..   How can this be fixed?  
Hi, @yuanliu! Thanks for your reply and clue. I have no spare instance right now but I've exported contents of this KV Store time-based lookup into CSV file, reconfigured lookup definition to use t... See more...
Hi, @yuanliu! Thanks for your reply and clue. I have no spare instance right now but I've exported contents of this KV Store time-based lookup into CSV file, reconfigured lookup definition to use that CSV - and now it works. Looks like the problem is related only to KV Store time-based lookups. So this particular problem is solved but I'd like to know if such behavior is expected with KV Store lookups or it is some bug or my misconfiguration. My deployment is Splunk Enterprise 7.2.6 with MongoDB.