All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Hi  We have a cloud instance , however we would like have predictive storage analysis for feature requirement. As part of the i was trying to look after the accurate options available. While look at... See more...
Hi  We have a cloud instance , however we would like have predictive storage analysis for feature requirement. As part of the i was trying to look after the accurate options available. While look at it ,i noticed that our daily ingestion data is around 450-500 GB but when i check the Searchable storage (DDAS) has increased around 60GB compared to previous day. Could you please let me know whether i'm missing anything while doing this calculations. Secondly, is there a way to do predictable SVC & Storage analysis (DDAS & DDAA) for future requirement.    
Hello! Tell me, is there a ready-made solution in splunk that makes is possible to save data from dashboards into excel. This functionality is needed for all existing dashboards. It would be nice if ... See more...
Hello! Tell me, is there a ready-made solution in splunk that makes is possible to save data from dashboards into excel. This functionality is needed for all existing dashboards. It would be nice if the xls item appeared on the export button. Thank you! 
Hello, I'm encountering an issue with Splunk Forwarder on a Windows Server OS. When it runs under the "SplunkForwarder" user, it fails to send Sysmon logs. Surprisingly, the forwarding works correct... See more...
Hello, I'm encountering an issue with Splunk Forwarder on a Windows Server OS. When it runs under the "SplunkForwarder" user, it fails to send Sysmon logs. Surprisingly, the forwarding works correctly when the forwarder is configured to run as the "SYSTEM" user. While this resolves the immediate problem, I'm hesitant to continue using the "SYSTEM" user due to its extensive access to system resources. I'm seeking a better solution that allows the Splunk Forwarder to send Sysmon logs without compromising security. Any guidance on this matter would be greatly appreciated. Thank you.
Yep. My version works too   (of course if you do stats afterwards and not include the "zipped" field, it will vanish).
Command passed under search of my Monitoring Console, I have all my 17 Indexers "Up" with the right site repartion. I dont see the decomissionned indexer who dont have any splunkd running. (Splunkd... See more...
Command passed under search of my Monitoring Console, I have all my 17 Indexers "Up" with the right site repartion. I dont see the decomissionned indexer who dont have any splunkd running. (Splunkd have been disabled). Thanks
Here is the result when I did it   Please share your search for when you didn't get the result you were expecting
OK. Looks relatively good. Try to run | rest splunk_server=<your_cluster_manager> /services/cluster/manager/peers | table label site status from your MC
What do you mean by "I integrated my UF with Splunk"? Also the usual questions. 1. Do you have _any_ events from this forwarder (especially forwarder's own logs in _internal index) in your Splunk? ... See more...
What do you mean by "I integrated my UF with Splunk"? Also the usual questions. 1. Do you have _any_ events from this forwarder (especially forwarder's own logs in _internal index) in your Splunk? 2. Do you have connectivity from your UF to your receiving component(s)? Did you verify it manually? 3. Did you check your forwarder's logs ($SPLUNK_HOME/var/log/splunk/splunkd.log) for errors?
While there is no explicitly stated mpreview introduction in the 8.1.0 changelog, the command itself shows in the 8.1.0 version of the docs which suggests it wasn't available in previous versions and... See more...
While there is no explicitly stated mpreview introduction in the 8.1.0 changelog, the command itself shows in the 8.1.0 version of the docs which suggests it wasn't available in previous versions and was introduced in 8.1
  splunk btool server list clustering | grep factor   Hi thanks, here is the output : etc/system/default/servers.conf >>> ack_factor = 0 etc/apps/MULTI_SITE_APP/local/server.conf >>> replication... See more...
  splunk btool server list clustering | grep factor   Hi thanks, here is the output : etc/system/default/servers.conf >>> ack_factor = 0 etc/apps/MULTI_SITE_APP/local/server.conf >>> replication factor = 2 etc/apps/MULTI_SITE_APP/local/server.conf >>>search_factor = 2 etc/apps/MULTI_SITE_APP/local/server.conf >>>site_replication_factor = origin:1, site1:1, site2:1 total 2 etc/apps/MULTI_SITE_APP/local/server.conf >>>site_search_factor = origin:1, site1:1, site2:1 total 2 etc/system/default/server.conf >>> replication factor = 3 Regards,
I have enabled sysevent and sys_audit in splunk instance. But I am not receiving any logs from the servicenow. Do I have to configure anything on servicenow  
Can you please say, what do we need to enable on servicenow instance to send it's log to splunk. I enabled sysevent and syslog_audit on splunk instance. But not receiving logs. What to do? 
I installed Universal Forwarder On Linux Machine and integrate it with Splunk , but their is no logs returned on Splunk Search Head ,  as per your Knowledge I`m currently working on distributed Splun... See more...
I installed Universal Forwarder On Linux Machine and integrate it with Splunk , but their is no logs returned on Splunk Search Head ,  as per your Knowledge I`m currently working on distributed Splunk Enterprise .   Any Recommendations ?
Hi @SplunkySplunk , as @inventsekar said, these are thre ways to accelerate searches that runs in a different way and that re to use in different conditions. e.g. I used report acceleration when I ... See more...
Hi @SplunkySplunk , as @inventsekar said, these are thre ways to accelerate searches that runs in a different way and that re to use in different conditions. e.g. I used report acceleration when I had a dashboard with many real time searches, used by many users: I created an accelerated report that was visualized in the dashboard, in this way I had  a near real time dashboard used by many users, that runned only one search. Data Models, are the most efficient solution if you have to search only using predefined fields. Summary indexes are very useful when you want to reduce and structure your logs: e.. if you have the logs from a fireawll (that usually are very many and with many fields not always used!), you can reduce the logs and use the reducted logs for your searches, also on raw (reducted) logs. As me and @inventsekar said, it depends on what is your requirement. Ciao. Giuseppe
Hi team, Could you please support on my request.
I did not found  and i am also looking for the solution.
I have updated the universal forwarder with RPM and deb packages and following commands: rpm -Uvh and dpkg -i
Hi i'm using splunk 8.0.4 and when i use mpreview, return Unknown search command 'mpreview'. Any idea? Thanks
Two questions. In addition to comparison of host values for the purpose of exclusion, is there any other information you want to extract from sysmon_index?  I will assume no. Is presence in sysmon... See more...
Two questions. In addition to comparison of host values for the purpose of exclusion, is there any other information you want to extract from sysmon_index?  I will assume no. Is presence in sysmon_index necessary and sufficient for exclusion?  I will assume yes. With these assumptions, you don't need stats.  The following subsearch should suffice: index=dhcp_source_index NOT [search index=sysmon_index | stats values(host) as host]
Possible solution would be a missing JRE installation. https://docs.splunk.com/Documentation/DBX/3.15.0/DeployDBX/Prerequisites#Java_Runtime_Environment_.28JRE.29_requirements Validate JRE is insta... See more...
Possible solution would be a missing JRE installation. https://docs.splunk.com/Documentation/DBX/3.15.0/DeployDBX/Prerequisites#Java_Runtime_Environment_.28JRE.29_requirements Validate JRE is installed: java --version If nothing is returned, then on Ubuntu: sudo apt install default-jre Restart Splunk.