All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Thank you.
Hi Have you ever login into splunkbase.splunk.com? It could be so that you must 1st login with browser and "register" your splunk.com user into that site? It has been so long time when I have done t... See more...
Hi Have you ever login into splunkbase.splunk.com? It could be so that you must 1st login with browser and "register" your splunk.com user into that site? It has been so long time when I have done this last time that I cannot recall it now.  But as @gcusello said, If it isn't work with entering your splunk.com id and password, then just login to splunkbase.splunk.com with browser and download app and then install it. Anyhow I prefer that method, as then I could store those apps into local repository to get those exact versions later on if/when needed. In splunkbase there are many apps which has only one or few newer versions for download but not earlier. r. Ismo
Hi @andreitaordones, enter in apps.splunk.con then insert your credentials click on download accept the download connect to your Splunk go in Apps > manage apps > install from file upload the ... See more...
Hi @andreitaordones, enter in apps.splunk.con then insert your credentials click on download accept the download connect to your Splunk go in Apps > manage apps > install from file upload the file maybe a Splunk restart is required, it depends on the app for more infos see at https://docs.splunk.com/Documentation/AWSsecurity/1.1.0/InstallationConfiguration/InstallingtheapptoSplunkEnterprise  Ciao. Giuseppe
Can you please guide me on how to do that?
Can you please guide me how to do that?
Hi @vihshah, if you only need to search in a main search using a secondary search fiel, you have to use a subsearch, putting attention that the field name must be the same in both the searches (fiel... See more...
Hi @vihshah, if you only need to search in a main search using a secondary search fiel, you have to use a subsearch, putting attention that the field name must be the same in both the searches (field names are case sensitive) if they are different, you have to rename the one i the subsearch, so something like this: index=index1 [ search index=index2 | fields my_field ] | ... If instead you need to use also fields from the second seacrh you have to use a different approach. Ciao. Giuseppe
@prakash007 You posted this over a year ago but I'd like to know if you managed to solve this issue? I've similar setup and getting HTTP 502 Bad Gateway
as @PickleRick said this is how email works. As you have there 3 separate email even account admin@foo.bar will be as cc on all of those. There is no way how you can separate those into three separat... See more...
as @PickleRick said this is how email works. As you have there 3 separate email even account admin@foo.bar will be as cc on all of those. There is no way how you can separate those into three separate emails with to-recipients and then merge those again into one for cc-recipient. If you want that this works like you want, then you must change your process and handle this someway different way. Could you e.g. separate alert for two part: one for to recipients and second one for cc recipients? Unfortunately I'm afraid that this generates some other issues to you
Hi, So my task is to extract a field from a query and search for that field. That query will give an object value as a string and want to extract data from there.  In summary, I need 3 things 1.... See more...
Hi, So my task is to extract a field from a query and search for that field. That query will give an object value as a string and want to extract data from there.  In summary, I need 3 things 1.  plain query to get the data and extract a particular field. 2. Use that field as an input for the second query. 3. Get object data as a string as a result, extract fields from there, and generate a report from it in tabular format. I was able to reach till 1st step and extract the field from it.  but I am unable to search for it. below is the query I tried. sourcetype="mykube.source" "failed request"  | rex "failed request:(?<request_id>[\w-]+)" | table request_id | head 1 | eval req_query = request_id | search req_query if I try till `head 1` I get first request_id but after that result is empty for me.
Hi @andreitaordones, beware that you have to use your credentials in Splunk.com, not credenzials on the system. Anyway, you can download them on your pc and install from files. Ciao. Giuseppe
Hi You should check from https://advisory.splunk.com/?301=/en_us/product-security.html in which version Splunk has fixed this. Then update your environment at least to that version or even better if... See more...
Hi You should check from https://advisory.splunk.com/?301=/en_us/product-security.html in which version Splunk has fixed this. Then update your environment at least to that version or even better if you could go to the latest one. You could check which openssl version you have. in splunk by splunk version Splunk 9.1.2 (build b6b9c8185839) splunk cmd openssl version OpenSSL 1.0.2zi 1 Aug 2023 This works both Splunk server and UF. r. Ismo 
I'm trying to install a few apps in Splunk.    The dialogue says, "Enter your Splunk.com username and password to download the app."   I use the username/password combination I'm using for splunk.com... See more...
I'm trying to install a few apps in Splunk.    The dialogue says, "Enter your Splunk.com username and password to download the app."   I use the username/password combination I'm using for splunk.com and I continually get back an error message "Incorrect username or password". 
It's not up to Splunk. It's up to the email infrastructure. In the end email to many recipients ends as many single emails in each of the recipient's mailbox. So i'm not quite sure what you want to a... See more...
It's not up to Splunk. It's up to the email infrastructure. In the end email to many recipients ends as many single emails in each of the recipient's mailbox. So i'm not quite sure what you want to achieve here.
There are two different aspects - technical and formal. While I could go into technical details, the most important thing is the formal one. A single license should be used once only. Either on a sta... See more...
There are two different aspects - technical and formal. While I could go into technical details, the most important thing is the formal one. A single license should be used once only. Either on a standalone server (which effectively acts as its own license master) or being installed on a license server to which you attach license peers which "use" the capacity granted by the license. Since your Splunk version seems to be relatively ancient (are you sure you're not referring to Enterprise Security version? It'd still be quite old but not that old), you might however have problems connecting both your old and your new environments to the same license server. Your situation is quite unusual so I'd advise engaging your friendly local Splunk Partner - together with the Splunk Sales team they might come up with a reasonable solution for you.
Hi You probably are familiar with this document https://lantern.splunk.com/Splunk_Platform/Product_Tips/Upgrades_and_Migration/Upgrading_the_Splunk_platform ? In general how I see this.  Usually t... See more...
Hi You probably are familiar with this document https://lantern.splunk.com/Splunk_Platform/Product_Tips/Upgrades_and_Migration/Upgrading_the_Splunk_platform ? In general how I see this.  Usually there should be release/change management process in place. Also you should have some kind of road map for your splunk environment, which are taking care of those regular splunk patching and upgrades. Usually I prefer 1-2 updates per year and over those needed urgent security upgrades based on content of those unless those cannot wait for regular patching window.  For security patches you should follow Splunk security page https://advisory.splunk.com/?301=/en_us/product-security.html and also Splunk's slack has e.g. https://splunk-usergroups.slack.com/archives/C1S5BEF38 (#security) and https://splunk-usergroups.slack.com/archives/C047WPATG (#announcements) channels. From those channels you will get notices when there is some issues found. If/when you have distributed environment or more than one server, you should have some kind of automation which applies needed standards etc. to your environment and operation processes. r. Ismo
Hi you can use same license on those, but only one can be active at the same time. If you need use it on both at the same time you must use license server where you put it and then both (or another ... See more...
Hi you can use same license on those, but only one can be active at the same time. If you need use it on both at the same time you must use license server where you put it and then both (or another one) is as license client for it. Another option is ask that Splunk support will split that license to two separate license file. r. Ismo
@isoutamo  No sir, its not about duplicates. z Let me be more clear then. Example : Below is my example result from alert search. Instance Name Owner Tags i-test1 Test1@gmail.com Inco... See more...
@isoutamo  No sir, its not about duplicates. z Let me be more clear then. Example : Below is my example result from alert search. Instance Name Owner Tags i-test1 Test1@gmail.com Incorrect i-test2 Test2@gmail.com Missing i-test3 Test3@gmail.com Missing Now I have to send email to these three users with all of them in "to" field. How I am setting email address ? using $result.Owner$. This is getting all three emails returned from result and alert notification is getting sent. But it is getting sent as three separate emails. One email to Test1@gmail.com, Another separate email to Test2@ge.com Third separate email to Test3@gmail.com For all of these three emails , admin@gmail.com is in CC.  This is just an example with 3 users. But like this there are 100 owners and different instances. Sending separate emails to all 100 users with admin@gmail.com will burden emailbox of admin@gmail.com and also follow up will be difficult. So, I have to send one email notification with all test1@gmail.com, test2@gmail.com and test3@gmail.com in "to" field and admin@gmail.com in Cc.  This just sends one email with all owners in to field. I want to achieve this using action.email.to.  This is my whole requirement. Please help me Regards, PNV
Hello, I have to migrate from an old Splunk standalone instance (version 6.4) to a new one. Is it possible to use in the new instance the same license currently used in the old one in production? Is... See more...
Hello, I have to migrate from an old Splunk standalone instance (version 6.4) to a new one. Is it possible to use in the new instance the same license currently used in the old one in production? Is there anything I need to pay attention to? Thank you in advance!
Hi @LearningGuy, You can add a statistics table to show all values like below addition to @ITWhisperer solution; <dashboard version="1.1" theme="light"> <label>Test</label> <row> <panel> ... See more...
Hi @LearningGuy, You can add a statistics table to show all values like below addition to @ITWhisperer solution; <dashboard version="1.1" theme="light"> <label>Test</label> <row> <panel> <chart> <search> <query>| makeresults format=csv data="StudentID,Name,GPA,Percentile,Email 101,Student1,4,100%,Student1@email.com 102,Student2,3,90%,Student2@email.com 103,Student3,2,70%,Student3@email.com 104,Student4,1,40%,Student4@email.com"</query> <earliest>-24h@h</earliest> <latest>now</latest> </search> <option name="charting.chart">column</option> <option name="charting.drilldown">none</option> <option name="charting.data.fieldShowList">[Name,GPA]</option> </chart> </panel> </row> <row> <panel> <table> <search> <query>| makeresults format=csv data="StudentID,Name,GPA,Percentile,Email 101,Student1,4,100%,Student1@email.com 102,Student2,3,90%,Student2@email.com 103,Student3,2,70%,Student3@email.com 104,Student4,1,40%,Student4@email.com"</query> <earliest>-24h@h</earliest> <latest>now</latest> </search> <option name="drilldown">none</option> </table> </panel> </row> </dashboard>
Hi @MuhammadMurad, I noticed you missed $ before '$SPLUNK_HOME', please try using $SPLUNK_HOME