All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Wow, thanks so much!  That solves all my problems!
| rex "duser=(?<duser>.*?) dvc=(?<dvc>\S+).*dhost=(?<dhost>\S+)"
Depending on the size of your data set, you could try something like this | appendpipe [| stats values(*) as * | eval Test="ALL"] | transpose 0 column_name=name header_field=Test | where mvc... See more...
Depending on the size of your data set, you could try something like this | appendpipe [| stats values(*) as * | eval Test="ALL"] | transpose 0 column_name=name header_field=Test | where mvcount(ALL) > 1 | fields - ALL | transpose 0 column_name=Test header_field=name
Hi @ghostrider, if you already extracted the Records field, it's easy and you can run: index=your_index Records>0 | ... if you didn't extracted the field, you have to extract it, something like th... See more...
Hi @ghostrider, if you already extracted the Records field, it's easy and you can run: index=your_index Records>0 | ... if you didn't extracted the field, you have to extract it, something like this: index=your_index | rex "MESSAGE:\s+Records::(?<Records>\d+)" | where Records>0 | ... I could be more sure and detailed if you can share some full sample of your logs. Ciao. Giuseppe
| sort 0 -Score | streamstats count as row sum(Score) as running | eventstats sum(Score) as total | where row <= 7 | eval Score=case(row == 6, total - running + Score, row == 7, total, true(), Score)... See more...
| sort 0 -Score | streamstats count as row sum(Score) as running | eventstats sum(Score) as total | where row <= 7 | eval Score=case(row == 6, total - running + Score, row == 7, total, true(), Score) | eval Name=case(row == 6, "Other", row == 7, "Total", true(), Name) | fields - row running total
yes I have tried this one like below but still it  is not masking the data. | rex field=abcd mode=sed "s/card number \d{4}\d{4}\d{4}(\d{4})/card number xxxx xxxx xxxx \1/"
Hi @bhavesh0124, sorry bu it isn't possible: Splunk isn't Excel in which you can collapse two cells in one. Ciao. Giuseppe
Hello All, I have created an Alert with the following query, Issue I'm having here is, I'm not receiving email alert even if the condition is met and events are returned.   | dbxquery query="SELEC... See more...
Hello All, I have created an Alert with the following query, Issue I'm having here is, I'm not receiving email alert even if the condition is met and events are returned.   | dbxquery query="SELECT eventTriggeredDate, APPLICATION_NAME, APPLICATION_NAMEENV, APPLICATION_GROUP, eventChain, eventType, eventMessage, eventMod, eventRule, eventSeverity FROM Admin.console.v_ES_RelevantEvents55 WHERE eventTriggeredDays <= 7 AND (APPLICATION_NAME='ABC_PRD' OR APPLICATION_NAME='XYZ-PRD') AND APPLICATION_NAMEENV='PRD'" connection="TESTING_DEV" | lookup users_email.csv "Application Name" as APPLICATION_NAME OUTPUT "Admin email" as Admin_email "QA email" as QA_email "Developers email" as Developers_email | lookup policy_details.csv policy_name as eventRule OUTPUT policy_description | eval users_mail = Admin_email.",".Developers_email.",".QA_email | stats count as Total_Events values(eventChain) as "Event Policy/Rule" values(eventType) as "Event Type" values(eventMod) as "Event Mod/Policy" values(eventRule) as "Event Rule" values(users_mail) as users_mail values(eventMessage) as eventMessage values(policy_description) as policy_description by APPLICATION_NAME, eventSeverity | eval eventMessage=mvindex(eventMessage, 0, 20) | where Total_Events > 10 | table APPLICATION_NAME, Total_Events, eventSeverity, "Event Type", "Event Rule", users_mail, eventMessage, policy_description | rename APPLICATION_NAME as application_name, Total_Events as number_of_events, eventSeverity as event_severity, "Event Type" as event_type, "Event Rule" as event_rule, eventMessage as event_message   I have given email list as $result.users_mail$, the values from the filed users_mail. I see the alert being triggered but i don't receive an email. Also is there a way we can add external links to the Splunk Alerts?
I am trying to filter my search results where only a particular subset of the results should be shown. Example suppose if below is the intermediate search result.  MESSAGE: Records::0 MESSAGE: Reco... See more...
I am trying to filter my search results where only a particular subset of the results should be shown. Example suppose if below is the intermediate search result.  MESSAGE: Records::0 MESSAGE: Records::1 MESSAGE: Records::0 MESSAGE: Records::4 Final search results should contain only where the records are greater than 0. Is there any query which can help with this?
duser=NT AUTHORITY\SYSTEM dvc=10.10.10.10 rt=Jan 29 2024 04:41:24 dhost=abcd.efgh.com SHA-1=Not available MD5=Not available Size=Not available content=0x00000001 (1) contentLabel=Current Version Cont... See more...
duser=NT AUTHORITY\SYSTEM dvc=10.10.10.10 rt=Jan 29 2024 04:41:24 dhost=abcd.efgh.com SHA-1=Not available MD5=Not available Size=Not available content=0x00000001 (1) contentLabel=Current Version Content timezone=Pacific Standard Time I want to be able to pull out the duser, dvc, dhost etc.  Focusing on the duser ATM because it is giving me the most grief because of the space in the value.  If I can get one to work, I can get the rest working.   The search so far is simple; index="abc"  | rex field=_raw "duser=(?P<User>.*?) dvc" | table User      
Thanks for the clarification, but the regex you provided still doesn't match the data.  Did you try the one I gave?
Hi,  I want to get rid of columns which have single unique value. There could be multiple columns showing this behavior.  Test Value1 Value2 Value3 Value4 Test1 2 b a 7 Test2 1 c... See more...
Hi,  I want to get rid of columns which have single unique value. There could be multiple columns showing this behavior.  Test Value1 Value2 Value3 Value4 Test1 2 b a 7 Test2 1 c a 7   I want to get rid of columns "Value3" and "Value4" since they have only one unique value across.   @gcusello @ITWhisperer @scelikok @PickleRick     
Any specfic example query please to use this 
Hi! I'm also getting this problem. Any ideas on how to solve it? Regards. Jorge
#mission_control, # splunk cloud Hi  In my org primarily Mission Control events are investigated by SOC as soon as they pop up, if futher investigation is needed the incident is escalated to Enterp... See more...
#mission_control, # splunk cloud Hi  In my org primarily Mission Control events are investigated by SOC as soon as they pop up, if futher investigation is needed the incident is escalated to Enterprise security TEAM who is responsible to perform deeper/detailed investigation and update back in Mission Control.  USE CASE:  The enterprise security manger wants a DASHBOARD which will inform him about :  if the investigation is being performed by his team (ES)> how much average time his team member takes to resolve an incident > averaged over a month.   For ES team I have lookup file or also I can type there name(Only 7-8 people) > I NEED A QUERY WHICH WILL EVALUATE WHEN assigne=(tom,tim,xyz) , difference between update_time & create_time , averaged out over month.  Field we have : | mcincidents   add_response_stats=true | eval create_time=strtime(create_time, "%m/%d%Y %I:%M:%S %p") | eval update_time=strtime(create_time, "%m/%d%Y %I:%M:%S %p") | table assigne, create_time, update_time, description, disposition, id, incident_type, name, sensitivity, source_type, summary
  got nasty gram for posting links search online for freeload101 github in scripts Splunk_UniversalForwarder_Installer.bash
Actually the field abcd is already extracted but that field contains all the values including credit card number and expiry date example like below: abcd="n required YES Accommodation [Bucharest... See more...
Actually the field abcd is already extracted but that field contains all the values including credit card number and expiry date example like below: abcd="n required YES Accommodation [Bucharest] 5 Nights – Novotel Bucharest HDFC Master card number 1234 4567 0002 4786 Expiry Date of HDFC card 02/28 Any other relevant info Thanks and Regards, santhosh. From" abcd="n required YES Accommodation [Bucharest] 5 Nights – Novotel Bucharest HDFC Master card number 2345 3333 0012 0405 Expiry Date of HDFC card 06/29 Any other relevant info QATAR FARE IS INR 122645 /-ONWARD" abcd="n required YES Accommodation [Bucharest] 6 Nights – Novotel Bucharest HDFC Master card number 2323 2324 0010 0600 Expiry Date of HDFC card 06/34 Any other relevant info [cid:image001.png@01DA4ACD.FF6" so the data already extracted in one field called abcd , so I want to mask credit card number except last 4 digits and expiry date.
Hi man03359, I'd say nothing wrong with being a noob, we all are at some point, continuously. To your question, while perhaps not quite directly responsive: you might want to create tags (and revie... See more...
Hi man03359, I'd say nothing wrong with being a noob, we all are at some point, continuously. To your question, while perhaps not quite directly responsive: you might want to create tags (and review the exisitng ones) for certain types of data that you know lies in different indexes and sourcetypes. This can be a way of creating a searchable correlation that is properly time-indexed; and then you can pivot to the specific index/sourcetype. Some explanation on tagging/eventypes here:  what is the basic difference between tags and even... - Splunk Community About tags and aliases - Splunk Documentation About event types - Splunk Documentation
The cited SEDCMD is looking for the literal text "abcd=", which doesn't exist in the sample event.  Therefore, the card number will not be masked.  It's also looking for groups of 4 digits separated ... See more...
The cited SEDCMD is looking for the literal text "abcd=", which doesn't exist in the sample event.  Therefore, the card number will not be masked.  It's also looking for groups of 4 digits separated by hyphens, which also is not in the sample event.  SEDCMD looks at the raw event rather than  a specific field. Try this SEDCMD=accmasking = s/card number \d{4} \d{4} \d{4} (\d{4})/card number xxxx xxxx xxxx \1/  
My company flagged redis being vulnerable to security because requirepass is not enabled. How do I enable it and give the password to the clients that connect to the redis?