All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Unfortunately that’s true.
HI The  screenshot was an example I installed ofcial app "Mimecast for Splunk" and app folder "TA-mimecast-for-splunk", and I created a custom app called "Mimecast for LiveSOC" and the folder app "... See more...
HI The  screenshot was an example I installed ofcial app "Mimecast for Splunk" and app folder "TA-mimecast-for-splunk", and I created a custom app called "Mimecast for LiveSOC" and the folder app "TA-mimecast-for-livesoc" , I need to know if the custom app name is correct for force the data to use the configuration from "sourcetype" from custom app and not the oficial app 
This was perfect, TY.   I updated /etc/security/limits with the appropriate values and all is working now.
I am on the same boat. Any update on above request
Hi @Ajit.kunjir, I wasn't able to find anything specific on how to do it, but from some Support tickets I read, it seems possible. I would recommend reaching out to our AppD Consultants for a quick... See more...
Hi @Ajit.kunjir, I wasn't able to find anything specific on how to do it, but from some Support tickets I read, it seems possible. I would recommend reaching out to our AppD Consultants for a quick session.  https://community.appdynamics.com/t5/Knowledge-Base/A-guide-to-AppDynamics-help-resources/ta-p/42353#call-a-consultant
This ended up working - not sure what was wrong before, I think the timestamps were off. But it's all there, thanks!
I'm a user of the free Community Edition. So I can't open support tickets, right?
I have a distributed environment with 2 independent search heads.  I run the same search on both, and one shows a field that the other does not.  I can't figure out why.  I can't find any data models... See more...
I have a distributed environment with 2 independent search heads.  I run the same search on both, and one shows a field that the other does not.  I can't figure out why.  I can't find any data models that mention the index or sourcetype I'm searching.  Is there a way to show me if a data model is being used in my search? The logs are coming from an IBM i-series system using syslog through sc4s.
Attached log snippet
Hello, did anyone find a solution for this error? 
If you are partner you could ask it from partnerverse by email. Or create a support case via it’s portal.
You can pin those to appear in top of list, but this is not the same as dragging those to the “correct” place.
hello all, I have an app that to perform an action I cant insert the required parameter as a list. but as a string. this is a bit issue because I am using data value from action results as the para... See more...
hello all, I have an app that to perform an action I cant insert the required parameter as a list. but as a string. this is a bit issue because I am using data value from action results as the parameter to insert, for example:  "my_App_action:action_result.data.*.device_id" and as far as I understand, action_result.data collection is always an array. so I can not use directly this action results returned parameter as a parameter to insert to my action. the only workaround I found is to add a code block that gets the datapath-parameter as input, and outputs the value_name[0]. is there a better workaround for this?  
Please create a support ticket to splunk.
In previous versions of Splunk (at least up to 9.1.0), we could re-arrange the Apps menu by dragging the apps up or down in the Launcher app.  Now that Launcher seems to have been rebuilt with Dashbo... See more...
In previous versions of Splunk (at least up to 9.1.0), we could re-arrange the Apps menu by dragging the apps up or down in the Launcher app.  Now that Launcher seems to have been rebuilt with Dashboard Studio that capability is no longer present.  Is there a new way for users to re-arrange their Apps menu?
You can get a free developer license at https://dev.splunk.com/enterprise/
What does the "1d@d" for span mean?
Hello, I'm looking to change our indexing architecture We have dozens of AWS accounts. We use the Splunk AWS app to ingest the data from a SQS queue. Currently, we have a single SQS-based input typ... See more...
Hello, I'm looking to change our indexing architecture We have dozens of AWS accounts. We use the Splunk AWS app to ingest the data from a SQS queue. Currently, we have a single SQS-based input type for each individual AWS account that grabs all the data and applies the index and a catch-all sourcetype named aws:logbucket. From there, we route the data to a more specific sourcetype based on the type of data. aws:logbucket will be changed to aws:cloudwatch:vpcflowlogs, aws:cloudtrail, aws:config, etc. This has worked well enough for us, but I now have a new requirement. For each of these AWS accounts, I want a separate index for the specific AWS service by AWS account. ie) awsaccount1-vpcflow, awsaccount1-cloudtrail, awsaccount2-vpcflow, etc. We use S2, so storing aws:cloudtrail with aws:cloudwatch:vpcflow hurts the performance of aws:cloudtrail data. Searching for aws:cloudtrail data requires us to write back all aws:cloudwatch:vpcflow data back to disk. This has accounted for 120x more buckets required written to disk for aws:cloudtrail since it's stored with VPCFlow. Expanding these indexes to be more specific will have huge performance improvements for my Splunk environment I would like to use a lookup table to match the source of the SQS-based S3 to specify the index and sourcetype. I am unable to do this using regex and FORMAT, since the bucket names and index names are not a 1-1 match. ie) for s3://acc1/cloudtrail/..., I would like to have a lookup table that tells it to route to index account1 and sourcetype aws:cloudtrail, for s3://acc2/config/... I would like to have it route to index account2 and sourcetype aws:config. After that long summary... how do I technically implement this and how will a lookup with ~300-400 different rows affect performance? Thank you, Nate      
I worked with Sahil Sharma of Technical Support on this.  The answer was to update the add-on from 4.0.1 to 4.0.2.  That fixed the problem.
I am getting an error when installing PHP agent on the RHEL server.  PHP version id: 7.4 PHP extensions directory: /usr/lib64/php/modules PHP ini directory: /etc/ PHP thread safety: NTS Controll... See more...
I am getting an error when installing PHP agent on the RHEL server.  PHP version id: 7.4 PHP extensions directory: /usr/lib64/php/modules PHP ini directory: /etc/ PHP thread safety: NTS Controller Host: https:\/\/xxxxxxxx.saas.appdynamics.com\/controller\/ Controller Port: 8090 Application Name: WebApp Tier Name: DemoWebTier Node Name: DemoNode Account Name: xxxxxxxx Access Key: xxxxxxxx SSL Enabled: true HTTP Proxy Host: HTTP Proxy Port: HTTP Proxy User: HTTP Proxy Password File: TLS Version: TLSv1.2 [Error] Agent installation does not contain PHP extension for PHP 7.4 i was installing the agent using shell script method. please let me know if someone has faced similar issue and how can we fix it. Thanks