All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Hi All, I am new to splunk clustering environment and i have few questions when i attend interview.Any one please help me on this question 1.Can we delete index folder ?will we have permission to d... See more...
Hi All, I am new to splunk clustering environment and i have few questions when i attend interview.Any one please help me on this question 1.Can we delete index folder ?will we have permission to delete the index folder Splunk\var\lib\splunk\TestDB. 2.Can we copy the Index folder and paste it in someother index folder will be able to search the logs? 3.Where can we install DB connect app and other apps in Search head cluster OR Indexer Server cluster? 4.What is the process name when we extract logs from props and transform.conf file? 5.Upgrade Splunk cluster enironment with simple steps? 6.What is the process of search head captain will do ? Thanks, Karthigeyan R
I agreed that we should have option to move data from SmartStore back to local storage.
@MikeR a few ways to achieve this, but simplest is probably to use the Phantom Phantom app with the 'add_artifact' action. This will use phantom.collect() and if you set the container input to the id... See more...
@MikeR a few ways to achieve this, but simplest is probably to use the Phantom Phantom app with the 'add_artifact' action. This will use phantom.collect() and if you set the container input to the id of the other container it will update it with the provided artifact info provided in the action and should  return an id. 
@Carloszavala121 you can use the Timer app to generate a container with a specific label to set off any associated, active automation. You can schedule the poll to create them as often you need to. 
Thanks for your reply @yuanliu  Unfortunately, your search did not provide the results I wanted. After executing the separate searches and abstract manually the result differs from the resultant of ... See more...
Thanks for your reply @yuanliu  Unfortunately, your search did not provide the results I wanted. After executing the separate searches and abstract manually the result differs from the resultant of your search. Please do try it out. After lots of try/error I finally found the one that does the trick. It is by using 'set diff' command. I will provide my solution tomorrow for everyone to use. Regards, Dan
I have a splunk search that is returning the wrong results from a kvstore if the secondUID field is set to itself before doing the lookup. This is distilled from the actual search for simply showing ... See more...
I have a splunk search that is returning the wrong results from a kvstore if the secondUID field is set to itself before doing the lookup. This is distilled from the actual search for simply showing the bug. Both secondUID  and uID should be represented as strings.  Does anybody know why  | eval secondUID=secondUID causes the lookup command to return the wrong results? When it is commented out the correct results are returned. The results are consistently the same wrong results when they are wrong and the errors are event count dependent. So for instance, if I switch the head command on line 4 from 4000 results up to 10000 results, the lookup wrong result rate goes from 4.3% to 11.83% given the lines I am passing in for this example. If I pass in a different set of events, the results would still be wrong and consistently the same results wrong, but not necessarily the same % of wrong results compared to the other starting events.  If you either comment out that eval on line 8 or do | eval secondUID=tostring(secondUID) then the correct results are returned from the lookup command. If you switch tostring() with tonumber() the number of wrong lookups goes up.  I don't think this is intended functionality because | eval secondUID=secondUID should not be changing the results IMO, and the % of errors depend on how many events are passed through the search. More events = higher % of errors. The string comparison functions in the wheres also show nothing should be changing.  | inputlookup kvstore_560k_lines_long max=10000 | stats dc(uID) as uID by secondUID | where uID=1 | head 4000 ```keep 4000 results with the 1=1 uID to secondUID relationship established``` | eval secondUIDArchive=secondUID ```save the initial value ``` | where match(secondUIDArchive, secondUID) and like(secondUIDArchive, secondUID) ```initial value is unchanged``` | eval secondUID=secondUID ```this line causes the search to return different results compared to when commented out``` | where match(secondUIDArchive, secondUID) and like(secondUIDArchive, secondUID) ```string comparison methods show they are the same still``` | lookup kvstore_560k_lines_long secondUID output uID ```output the first UID again where there should be a 1=1 relationship``` | table uID secondUID secondUIDArchive | stats count by uID ```the final output counts of uID vary based on whether the eval on line 8 is commented out.```        
You can see my earlier comment.  Essentially you don't need append/stats for this job. index=dhcp_source_index NOT [search index=sysmon_index | stats values(host) as host] If you only want to k... See more...
You can see my earlier comment.  Essentially you don't need append/stats for this job. index=dhcp_source_index NOT [search index=sysmon_index | stats values(host) as host] If you only want to know which DHCP hosts  are not in sysmon_index, add stats values(host) or stats count by host  after this search.
Has anyone tried this add-on to pull the tfs commits into Splunk via Azure DevOps (Git Activity) - Technical Add-On. I tried installing this app on one of the heavy forwarder but inputs section of th... See more...
Has anyone tried this add-on to pull the tfs commits into Splunk via Azure DevOps (Git Activity) - Technical Add-On. I tried installing this app on one of the heavy forwarder but inputs section of this add-on does not work.
I would like to predict memory ,cpu and storage usage of my splunk servers ( Indexers, search heads, )  step wise plan is to first do an analysis of current usage and then predict 6 months usage of ... See more...
I would like to predict memory ,cpu and storage usage of my splunk servers ( Indexers, search heads, )  step wise plan is to first do an analysis of current usage and then predict 6 months usage of my own splunk platform ( Like indexers , search  heads , heavy forwarders) 
Hello, I'm facing an issue with dashboards graphs. When checking the graphs from metric browser, all the data are showing fine. See below. But when we create an dashboard with same data, ... See more...
Hello, I'm facing an issue with dashboards graphs. When checking the graphs from metric browser, all the data are showing fine. See below. But when we create an dashboard with same data, we see some gaps. See below. Could someone have an idea why this is happening?
The "Bad request for url..." verbiage typically points to an invalid webhook address.  Make sure the URL of the webhook is publically accessible, is addressable with HTTPS, and doesn't contain any pr... See more...
The "Bad request for url..." verbiage typically points to an invalid webhook address.  Make sure the URL of the webhook is publically accessible, is addressable with HTTPS, and doesn't contain any private certificates in the chain.  This Lantern article (with a video walkthrough) may be helpful => https://lantern.splunk.com/Data_Descriptors/Microsoft/Getting_started_with_the_Microsoft_Teams_Add-on_for_Splunk   As, an alternative, you can use Azure Functions to get the same call record data.  This way, you don't have to have the webhook on your forwarder.  Instead, all the plumbing happens in Azure and the data is pushed to Splunk via HEC.  Here is a Lantern article on that => https://lantern.splunk.com/Data_Descriptors/Microsoft/Getting_started_with_Microsoft_Teams_call_record_data_and_Azure_Functions
Hello community, how can I make a playbbok run every 5 minutes automatically?
I've been searching for awhile, but I haven't been able to find how to access an alert's description from within my add-on's alert action Python code. I'm using helper.get_events() to get the alert's... See more...
I've been searching for awhile, but I haven't been able to find how to access an alert's description from within my add-on's alert action Python code. I'm using helper.get_events() to get the alert's triggered events and helper.settings to get the title of the alert. Both are from https://docs.splunk.com/Documentation/AddonBuilder/4.1.4/UserGuide/PythonHelperFunctions. That documentation page doesn't seem to list any way to pull an alert's description though. Does anyone know where it's stored/how to access it?
I am working on a playbook where there is a need to copy the current event's artifacts  into a separate open and existing case.  We are looking for a way to automate this through phantom.collect +  p... See more...
I am working on a playbook where there is a need to copy the current event's artifacts  into a separate open and existing case.  We are looking for a way to automate this through phantom.collect +  phantom.add_artifact or other means. We have a way to pass in the existing case id  and need a solution to duplicate atrifacts from running event into that case specified by case id. 
Hi Giuseppe, I appreciate the lightning fast answer and I agree, there is a multitude of  logs to choose from. That's kind of the problem.  I will most certainly look at the link you supplied but I... See more...
Hi Giuseppe, I appreciate the lightning fast answer and I agree, there is a multitude of  logs to choose from. That's kind of the problem.  I will most certainly look at the link you supplied but I was trying to find out which logs other people feel work best for them.  In the mean time I will have a look around the content on your link. Ciao Norm 
Hi @mmcap , uing the Splunk Ta Windows (https://splunkbase.splunk.com/app/742) you can monitor many things on a windows devoce (server or cliente). If you have security requisites, the first data s... See more...
Hi @mmcap , uing the Splunk Ta Windows (https://splunkbase.splunk.com/app/742) you can monitor many things on a windows devoce (server or cliente). If you have security requisites, the first data source should be wineventlog:security. But there are many other sources that could be interesting. As I said, open the Add-On and see the possible inputs you have so you can choose the one you could require. Ciao. Giuseppe
When monitoring Windows systems which logs do you find to give the best information for finding security events and then tracking down the event from start to finish?
I am trying to convert a dashboard from Simple XML to Dashboard Studio. In the original dashboard there is a token that uses "$click.name2$ that links to the corresponding name of the field in anothe... See more...
I am trying to convert a dashboard from Simple XML to Dashboard Studio. In the original dashboard there is a token that uses "$click.name2$ that links to the corresponding name of the field in another dashboard. To my understanding, the equivalent of $click.name2$ in XML should be "$name" in Dashboard Studio; however, when I use "$name" the correct value is not returning. What would be the equivalent of "$click.name2" in Dashboard Studio? This is for a single value.
Thanks for all your help and advices.  I will try the rest command on the MC as u suggest tomorow, im back home now. Normally MC is well configured. I will update after searching. But I agree with... See more...
Thanks for all your help and advices.  I will try the rest command on the MC as u suggest tomorow, im back home now. Normally MC is well configured. I will update after searching. But I agree with you, I think I will have to open a case @splunk Best regards
Hi, thanks for the reply. To simplify it let us say we have two lists of items of same type it could be anything. How can we compare both lists and list only the subset of items not common to both ... See more...
Hi, thanks for the reply. To simplify it let us say we have two lists of items of same type it could be anything. How can we compare both lists and list only the subset of items not common to both lists. Regards, D