All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

This worked like a charm - thank you!
You won't find events without a timestamp because Splunk always stores every event with a timestamp.  If the event does not come with a timestamp or if the timestamp is invalid then Splunk will use t... See more...
You won't find events without a timestamp because Splunk always stores every event with a timestamp.  If the event does not come with a timestamp or if the timestamp is invalid then Splunk will use the timestamp from the previous event. The timestamp warning cited does not apply to same sourcetype as the nullQueue transform.  The warning is for wlc_syslog and the transform is for wlc_syslog_rt0.
Hi @richgalloway, @ITWhisperer  I have similar doubt but little tedious:  Use case:In my org primarily Mission Control events are investigated by SOC as soon as they pop up, if futher investigat... See more...
Hi @richgalloway, @ITWhisperer  I have similar doubt but little tedious:  Use case:In my org primarily Mission Control events are investigated by SOC as soon as they pop up, if futher investigation is needed the incident is escalated to Enterprise security TEAM who is responsible to perform deeper/detailed investigation and update back in Mission Control.  USE CASE:  The enterprise security manger wants a DASHBOARD which will inform him about :  if the investigation is being performed by his team (ES)> how much average time his team member takes to resolve an incident (for now I'm only focusing on this)> averaged over a month.  jeff is ES resource  & stephen is SOC resource  i want to pick end_time where resource is Stephen and notes is "Escalation to ES" and start_time where resource is jeff and subtract them in order to get claim_time_by_ES.  SO far the query I'm using but not successful yet is:    | mcincidents unwind_to=task | search incident_id="3e864839-xyzab" | eval is_es_team=if(IN(owner, "Jeff","Rama", "Mel"), 1, 0) | eval is_soc_team=if(IN(owner, "Stephen", "Crossman", "Ruby","Cole"), 1,0) | eval end_time_for_soc=if(is_soc_team==1 AND name=="Escalation to ES", end_time, null()) | eval start_time_for_ES=if(is_es_team==1, start_time, null()) | eval total_time_claimed=end_time_for_soc - start_time_for_ES   in the below snapshot of log the columns name are in sequence of:  owner > start_time > end_time > total_time_taken> notes    
I assumed (rather embarrassingly!) this restarted the deployment server splunkd! This is very useful. 
Thank you for sharing that link @burwell ! It was hugely helpful. What finally ended up working was the following: The additional where line was key. Thank you for helping me work through this! | ev... See more...
Thank you for sharing that link @burwell ! It was hugely helpful. What finally ended up working was the following: The additional where line was key. Thank you for helping me work through this! | eval _time = strptime(Opened_At,"%Y-%m-%d %H:%M:%S") | sort -_time | addinfo | where _time>=info_min_time AND (_time<=info_max_time OR info_max_time="+Infinity")  
  #!/bin/bash ########################## FUNC function UFYUM(){ cd /tmp rpm -Uvh --nodeps `curl -s https://www.splunk.com/en_us/download/universal-forwarder.html\?locale\=en_us | grep -oP '"https:... See more...
  #!/bin/bash ########################## FUNC function UFYUM(){ cd /tmp rpm -Uvh --nodeps `curl -s https://www.splunk.com/en_us/download/universal-forwarder.html\?locale\=en_us | grep -oP '"https:.*(?<=download).*x86_64.rpm"' |sed 's/\"//g' | head -n 1` yum -y install splunkforwarder.x86_64 sleep 5 } function UFDEB(){ cd /tmp wget `curl -s https://www.splunk.com/en_us/download/universal-forwarder.html\?locale\=en_us | grep -oP '"https:.*(?<=download).*amd64.deb"' |sed 's/\"//g' | head -n 1` -O amd64.deb dpkg -i amd64.deb sleep 5 } function UFConf(){ mkdir -p /opt/splunkforwarder/etc/apps/nwl_all_deploymentclient/local/ cd /opt/splunkforwarder/etc/apps/nwl_all_deploymentclient/local/ cat <<EOF> /opt/splunkforwarder/etc/apps/nwl_all_deploymentclient/local/app.conf [install] state = enabled [package] check_for_updates = false [ui] is_visible = false is_manageable = false EOF cat <<EOF> /opt/splunkforwarder/etc/apps/nwl_all_deploymentclient/local/deploymentclient.conf [deployment-client] phoneHomeIntervalInSecs = 60 [target-broker:deploymentServer] targetUri = XXXXXXXXXXXXXXXXXXXXXXX:8089 EOF cat <<EOF> /opt/splunkforwarder/etc/system/local/user-seed.conf [user_info] USERNAME = admin PASSWORD = XXXXXXXXXXXXXXXXXXXXXXXX EOF /opt/splunkforwarder/bin/splunk cmd btool deploymentclient list --debug /opt/splunkforwarder/bin/splunk start --accept-license } ######################################################### MAIN # Check for RPM package managers if command -v yum > /dev/null; then UFYUM UFConf else echo "No YUM package manager found." fi # Check for DEB package managers if command -v dpkg > /dev/null; then UFDEB UFConf else echo "No DEB package manager found." fi
got nasty gram for posting links search online for freeload101 github   in scripts Splunk_UniversalForwarder_Installer.bash got nasty gram for posting links search online for freeload101 githu... See more...
got nasty gram for posting links search online for freeload101 github   in scripts Splunk_UniversalForwarder_Installer.bash got nasty gram for posting links search online for freeload101 github in scripts Splunk_UniversalForwarder_Installer.bash
got nasty gram for posting links search online for freeload101 github   in scripts Splunk_UniversalForwarder_Installer.bash
@NoSpaces - That could be true because Splunk applies Timestamp Parsing before Transforms (nullQueue). I hope this helps to understand why you are seeing the log. Please upvote and accept if this ... See more...
@NoSpaces - That could be true because Splunk applies Timestamp Parsing before Transforms (nullQueue). I hope this helps to understand why you are seeing the log. Please upvote and accept if this helps and resolves your query!!!
got nasty gram for posting links search online for freeload101 github in scripts Splunk_UniversalForwarder_Installer.bash
Hi. Perhaps you can show what your output looks like but basically whatever the final fields are in the search results, those are the fields that can be used in email. What I often do is format up s... See more...
Hi. Perhaps you can show what your output looks like but basically whatever the final fields are in the search results, those are the fields that can be used in email. What I often do is format up special fields to use in email/slack that are easier for the user to see. For example, I have a search that shows me missing indexers in a cluster manager. My code snippet is | eval cluster_manager=host | stats count by missing_indexer,cluster_manager | eval missing_indexer_cm=missing_indexer + " (" + cluster_manager + ")" | eventstats values(missing_indexer_cm) as missing_indexer_cm   I create a new field missing_indexer_cm which combines 2 fields missing_indexer and cluster_manager So the output is approximately this missing_indexer cluster_manager count missing_indexer_cm --------------- --------------- ----- ------------------- idx1.foo.com cm3.foo.com 42 idx1.foo.com (cm3.foo.com) And then in alerting I use $result.missing_indexer_cm$ but when users click on the results of the search they see the above with all the info  
@pujan - To tell you simply what "Universal Forwarder Credentials" is: * An App that contains an SSL certificate and other stuff for Splunk UF to send data to your Splunk cloud stack. * Also, I thi... See more...
@pujan - To tell you simply what "Universal Forwarder Credentials" is: * An App that contains an SSL certificate and other stuff for Splunk UF to send data to your Splunk cloud stack. * Also, I think it contains outputs.conf, to specify where data will going to be forwarded (address of your cloud stack).   To collect the Windows logs, as I can see you have already downloaded the Add-on for Windows. You can follow its' documentation to see how to configure the inputs - https://docs.splunk.com/Documentation/AddOns/released/Windows/AbouttheSplunkAdd-onforWindows   If you have more than 2-3 windows forwarders to deploy same Windows input on, I would prefer to deploy all these Apps including UF Cloud Credentials App via deployment server. Reference - https://docs.splunk.com/Documentation/Splunk/9.1.3/Updating/Configuredeploymentclients   I hope this helps!!!
Does adding | addinfo help you @Mindy_McTiernan  https://www.splunk.com/en_us/blog/tips-and-tricks/i-cant-make-my-time-range-picker-pick.html   | eval unixtime_Opened_At | eval _time=unixtime_Open... See more...
Does adding | addinfo help you @Mindy_McTiernan  https://www.splunk.com/en_us/blog/tips-and-tricks/i-cant-make-my-time-range-picker-pick.html   | eval unixtime_Opened_At | eval _time=unixtime_Opened_At | addinfo | timechart ...
Hi @ezamit, the solution from @ITWhisperer  is perfect! Ciao. Giuseppe
@raghul725 - You can use the token inside a subject of the Splunk email action. But it will take first value from the field instead of the total. To do that use this instead in your query instead of... See more...
@raghul725 - You can use the token inside a subject of the Splunk email action. But it will take first value from the field instead of the total. To do that use this instead in your query instead of addcoltotals: my_search |chart count AS XXXX by YYYY | | appendpipe [| stats sum(File_Count) by Total_Delivered]   Use something like this in the subject of the email Files count is $result.Total_Delivered$   Reference - https://docs.splunk.com/Documentation/SplunkCloud/9.1.2308/Alert/EmailNotificationTokens   I hope this helps!!! 
| eval "delta(EpochOT)" = if(NO % 2 = 0, null(), 'delta(EpochOT)')
Thanks @gcusello . That's a great suggestion.  I added | delta EpochOT p=1 to the search and it gave me the following results Is there a way we can do every other row in delta. I want Row 3 - Ro... See more...
Thanks @gcusello . That's a great suggestion.  I added | delta EpochOT p=1 to the search and it gave me the following results Is there a way we can do every other row in delta. I want Row 3 - Row 2, Row 5 - Row 4, Row 7 - Row 6 etc. Thanks again for your help 
I'm literally getting this same error. Any solutions other than basically rebuildling?
Hello,   I am using addcoltotals command to get the total value of a column and I would like to display the value returned by addcoltotals command in the subject of the email when an alert is trigg... See more...
Hello,   I am using addcoltotals command to get the total value of a column and I would like to display the value returned by addcoltotals command in the subject of the email when an alert is triggered.   my_search|chart count AS XXXX by YYYY| addcoltotals labelfield="Total Delivered"   The output is   Files | Files_Count | Total Delivered F1     |     3                   | F2     |      5                  | F3     |      3                  |            |      11               | Total   I would like 11 to be displayed in the subject line. Tried various tokens but could not get it working.   Regards  
Hi @ezamit, di you explored the delta command (https://docs.splunk.com/Documentation/SplunkCloud/latest/SearchReference/Delta)? Ciao. Giuseppe