All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

I made a graph that send time data at click point. I use "fieldformat" to change time data shown. This is my code about time part at this graph.  | rename _time AS Date | fieldformat Date = strft... See more...
I made a graph that send time data at click point. I use "fieldformat" to change time data shown. This is my code about time part at this graph.  | rename _time AS Date | fieldformat Date = strftime(Date,"%Y-%m-%d")  So the token data send like this "2024-01-23"   I want to set the time with the data received from the token about another graph. For example, If time_token send me "2024-01-23", I want to show only the data from 2024-01-23 in another graph. I tried this code, but it not worked. (Maybe it cause about format changing) | where _time = time_token How could I solve this problem? 
What do you mean by "skip"?
Hi @PickleRick ,    I don't want to remove the value, I just want to skip for that instance only if DMZ is passed as token value, when other values are passed, the condition needs to be there,    I... See more...
Hi @PickleRick ,    I don't want to remove the value, I just want to skip for that instance only if DMZ is passed as token value, when other values are passed, the condition needs to be there,    I'm having a value from dashboard input dropdown to macro, where I need the condition to skip when DMZ is passed.     Thanks in Advance! Manoj Kumar S
If you run the code snippet I shared, you should see results i.e. it works. This seems to imply that there is something else going on in your search which is causing you to have no results. Please sh... See more...
If you run the code snippet I shared, you should see results i.e. it works. This seems to imply that there is something else going on in your search which is causing you to have no results. Please share your full search in a code block </>
sorry , I have put them in double inverted commas , still no results
Your time format string should be in double quotes | makeresults | where false() | appendpipe [stats count | where count=0 | eval timeval=strftime(now(), "%d/%m/%Y") | where count = 0]
| streamstats count as row current=f last(Value) as previous | eval row=row%2 | eval diff=if(row=1,Value-previous*row,null()) | fields - previous row
Hi @chakavak, the default folder has a minor priority than local and you cannot modify it. [default] host = mydashboard must be inserted in inputs.conf not in server.conf. Open a case to Splunk Su... See more...
Hi @chakavak, the default folder has a minor priority than local and you cannot modify it. [default] host = mydashboard must be inserted in inputs.conf not in server.conf. Open a case to Splunk Support for behavior non aligned with documentation, sending them a diag from that UF. Ciao. Giuseppe
you can run below query in your CMC. | rest splunk_server_group=* /services/licenser/pools | eval total_quota_gb = round(your_quota_field / (1024 * 1024 * 1024), 2) | eval used_gb = round(your_use... See more...
you can run below query in your CMC. | rest splunk_server_group=* /services/licenser/pools | eval total_quota_gb = round(your_quota_field / (1024 * 1024 * 1024), 2) | eval used_gb = round(your_used_field / (1024 * 1024 * 1024), 2) | eval usage_percentage = round((used_gb / total_quota_gb) * 100, 2) | table splunk_server, total_quota_gb, used_gb, usage_percentage | eval alert_level = case( usage_percentage > 90, "Critical", usage_percentage >= 80, "High", usage_percentage >= 70, "Medium", true(), "Normal" ) | eval alert_message = case( usage_percentage > 90, "License usage has crossed critical threshold at " . usage_percentage . "%. Immediate attention required!", usage_percentage >= 80, "License usage has reached " . usage_percentage . "%. Please take immediate action.", usage_percentage >= 70, "License usage has reached " . usage_percentage . "%. Please take action.", true(), "License usage is within normal range." ) | where usage_percentage > 70 | table splunk_server, total_quota_gb, used_gb, usage_percentage, alert_level, alert_message   Make sure to replace your_quota_field & your_used_field with the correct field name representing the license quota in your Splunk Cloud environment.
lets say i have a query which is giving no result at present date but may give in future .  In this query I have calculated timeval = strftime(_time,"%y-%m-%d")  , since there is not data coming so ... See more...
lets say i have a query which is giving no result at present date but may give in future .  In this query I have calculated timeval = strftime(_time,"%y-%m-%d")  , since there is not data coming so "_time" will be empty hence timeval does not give any result . But still I have to show timeval with the help of present time , how can i do that .  i also used at the end of query appendpipe[stats count| where count==0  eval timeval=strftime(now(),%d/%m/%Y) | where count==0] but still no result.
21 = 1+2+3+4+5+6 i.e. it comes from your addcoltotals - try this | addcoltotals labelfield=Name Score*
Installed universal forwarder credential package and UF agent in a Windows Machine. Still not receiving data. Restart of splunk forwarder done. Installation of both package is with same user i.e. ro... See more...
Installed universal forwarder credential package and UF agent in a Windows Machine. Still not receiving data. Restart of splunk forwarder done. Installation of both package is with same user i.e. root. Unable to even receive any type of data from the windows OS.Need assistance.
No problem. You can "unmark" a post as not being a solution but no worries. Switching to /raw is also one of the possible solutions.
I found a serverName = $COMPUTERNAME in the path blow: \Peogrm Files\splunkuniversalforwarder\etc\system\default \server.conf  I changed this parameter and also added [default] host = mydashboard i... See more...
I found a serverName = $COMPUTERNAME in the path blow: \Peogrm Files\splunkuniversalforwarder\etc\system\default \server.conf  I changed this parameter and also added [default] host = mydashboard in config file , it didn't work  
You can't mix different distribution methods. If you're using ansible, use it to deploy to the deployer - that's the way to manage the SHC. What the deployer pushes depends on the push mode.
Hi Splunkers, today I have a "curiosity" about an architectural design I examinated last week. The idea is the following: different regions (the 5 continents, in a nutshell), every one with its set ... See more...
Hi Splunkers, today I have a "curiosity" about an architectural design I examinated last week. The idea is the following: different regions (the 5 continents, in a nutshell), every one with its set of log sources and Splunk Components. All Splunk "items" are on prem: Forwarder, Indexers, SH and so on. More over, every region has 2 SH: one with Enterprise Security and another one without it. Untile now, "nothing new under the sun", like we say in Italy. The new element, I men new for me and my experience, is the following one: there is a "centralized" cluster of SH, each one with Enterprise Security installed on it, that should collect the notables events from every regional ES. So, the flow about those component should be: Europe ES Notables -> "Centralized" ES Cluster America ES Notables -> "Centralized" ES Cluster And so on. So, my wonder is: is there any doc about forward Notables events from a ES platform to another one? I searched but I didn't find anything about that (probabile I searched bad, I know).  
Hi @PickleRick    Works like a charm! Thank you! It's way better than reverting to the /raw endpoint. Unfortunately I can't mark your answer as a solution anymore. I will edit my solution adding w... See more...
Hi @PickleRick    Works like a charm! Thank you! It's way better than reverting to the /raw endpoint. Unfortunately I can't mark your answer as a solution anymore. I will edit my solution adding what you suggested.   Thank you!
You have to be more specific. 1. There are many index names and sourcetypes which are not used in your environment. For example, I don't think you're using index names that I use in my private lab e... See more...
You have to be more specific. 1. There are many index names and sourcetypes which are not used in your environment. For example, I don't think you're using index names that I use in my private lab environment at home. You have to be more specific about what you need (while with the indexes you can mean checking just all defined indexes, with sourcetypes it's not clear) 2. You can't find something that isn't there. So you must have a list against which you'll be comparing your search results.  See https://www.duanewaddle.com/proving-a-negative/
It is probably due to the add-on calling an obsolete method from the splunklib. You can't do anything about it yourself except for either updating the add-on (if possible) or asking the developer to ... See more...
It is probably due to the add-on calling an obsolete method from the splunklib. You can't do anything about it yourself except for either updating the add-on (if possible) or asking the developer to fix it.
Hi @anandhalagaras1 , in this case see in the Cloud Monitoring Console App at https://<your_instance>.splunkcloud.com/en-US/app/splunk_instance_monitoring/alerts, you can find the aler named "CMC Al... See more...
Hi @anandhalagaras1 , in this case see in the Cloud Monitoring Console App at https://<your_instance>.splunkcloud.com/en-US/app/splunk_instance_monitoring/alerts, you can find the aler named "CMC Alert - Ingest Volume Exceeds 80%". You can open in search this alert and enable it: the search is  `sim_licensing_summary_base` | `sim_licensing_summary_no_split` | append [| search `sim_licensing_limit`] | stats latest(GB) as usage latest("license limit") as limit | eval ratio = usage/limit | where ratio > .8 but maybe the macros don't run outside this app, but you can run it in the app. if you want to use it outside the app, you should replae the macros. Ciao. Giuseppe