All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

When describing a problem, make sure to use consistent terms and explain new terms as you introduce them.  I assume that "original sites" means "HU1","IA2", and "IB0".  Is this correct?  The search l... See more...
When describing a problem, make sure to use consistent terms and explain new terms as you introduce them.  I assume that "original sites" means "HU1","IA2", and "IB0".  Is this correct?  The search logic seems opposite to what you are looking for.  Try this: |search location IN ("HU1","IA2","IB0") |eval row=if(location IN ("HU1","IA2","IB0"),location,"AM") |stats c by row.  
Hello There, I have installed Splunk DB Connect and all its requirements on ver 9.0 This works pretty well for queries either in Search or in SQL Exploereer. I want to use a stored procedure to re... See more...
Hello There, I have installed Splunk DB Connect and all its requirements on ver 9.0 This works pretty well for queries either in Search or in SQL Exploereer. I want to use a stored procedure to return data using DB Connect. The procedure works fine in SQL Exploereer, and from the MySQL commang line. If I try to call the procedure from Splunk Search - I get no results I am using this format: dbxquery connection=myconn procedure="{call my_nice_proc(@val);}" this should return a text string, or a table of results if the query/procedure retuns 1 or more rows.. Any ideas on what I am missing? thanks, eholz1
Subsearches produces results like (field1=foo OR field2=bar), which not fit the syntax of the IN operator.  However, since IN maps to a sequence of ORs under the coverts, you can use the subsearch wi... See more...
Subsearches produces results like (field1=foo OR field2=bar), which not fit the syntax of the IN operator.  However, since IN maps to a sequence of ORs under the coverts, you can use the subsearch without using IN. | append [| tstats summariesonly=true allow_old_summaries=true values(All_Traffic.dest_port) as dest_port values(All_Traffic.protocol) as protocol values(All_Traffic.action) as action values(sourcetype) as sourcetype from datamodel=Network_Traffic.All_Traffic where (All_Traffic.src_ip [| inputlookup internal_ranges.csv ]) AND NOT (All_Traffic.dest_ip [| inputlookup internal_ranges.csv ]) AND NOT (All_Traffic.protocol=icmp) by _time All_Traffic.src_ip All_Traffic.dest_ip | `drop_dm_object_name(All_Traffic)` | lookup ip_iocs.csv ioc as dest_ip OUTPUTNEW last_seen]  
Hi experts, I want to just combine these location sites - "HU1","IA2","IB0 and create new AM site. I tried this query, it works but it shows only new site. How to see the all original sites along ... See more...
Hi experts, I want to just combine these location sites - "HU1","IA2","IB0 and create new AM site. I tried this query, it works but it shows only new site. How to see the all original sites along with the new site in location field? |search location IN ("HU1","IA2","IB0") |eval row=if(location IN ("HU1","IA2","IB0"),"AM",location) |stats c by row. How to solve any idea? 
Hi @Shwetha.Gattu, You can submit it as a feature request here: https://community.appdynamics.com/t5/Idea-Exchange/idb-p/ideas
Aha. Right. I looked back into @inventsekar 's response and it's a bit wrong. A subsearch returns sets of conditions which obviously cannot be used with the IN clause. They should be used "directly" ... See more...
Aha. Right. I looked back into @inventsekar 's response and it's a bit wrong. A subsearch returns sets of conditions which obviously cannot be used with the IN clause. They should be used "directly" as conditions (possibly negated with the NOT keyword). Sadly I'm at my phone at the moment so I'm not in a position to write a solution.
I don't have a preference on which to use, I just need to be able to use the lookup efficiently for this search. It seems that WHERE and IN are not the correct clauses to use when using lookups? I am... See more...
I don't have a preference on which to use, I just need to be able to use the lookup efficiently for this search. It seems that WHERE and IN are not the correct clauses to use when using lookups? I am not sure
That might be a bit wrongly worded but it's used here for example https://docs.splunk.com/Documentation/Splunk/9.1.2/Forwarding/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest If you ... See more...
That might be a bit wrongly worded but it's used here for example https://docs.splunk.com/Documentation/Splunk/9.1.2/Forwarding/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest If you look at Masa diagrams you'll see which one the indexQueue is By default splunktcp input routes events into different queues depending on which keys are present in the data so if the data is not parsed, it's getting into the parsingQueue and so on. Check the system/default/inputs.conf
Can this be done as Feature request, we are Control center IOT team in Cisco, we can coordinate on explaining the usecases. We need it to be in preconfigured for all the java agents as we have multi... See more...
Can this be done as Feature request, we are Control center IOT team in Cisco, we can coordinate on explaining the usecases. We need it to be in preconfigured for all the java agents as we have multiple environments and don't want to create everytime for each instrumented application.
We are in the process of generating Events in ServiceNow using the Splunk add-on for ServiceNow.  We are passing Event information in the description field to communicate to the end user what actions... See more...
We are in the process of generating Events in ServiceNow using the Splunk add-on for ServiceNow.  We are passing Event information in the description field to communicate to the end user what actions need to be addressed.  As part of the output we want to include a table of information that summarizes the events detected.  We are able to aggregate and group the information as necessary, just having a hard time establishing a pattern where we can consistently control the output.    We have had issues formatting the data and we are seeking guidance on how we can exert greater control over the format.  We would like to include a brief sentence with instructions on how to move forward and we would like to identify all events impacted in table format.    |eval instructions = "The message we are seeking would look like the content below:  The header column and the output needs to be aligned and easy to read for the end user.    I have used a MVAppend Statement to add the header to a column, but could not concatenate the information in a manner where it display the information in a table format.   "  . " " | eval cheader = "Host Account Action " | eval tabledata= host . " " . Account . " " . Action | eval instructions = instructions . cheader . tabledata   "The account is a controlled account and you will need to provide justification for accessing the account outside of security controls.  Please review the table of events and provide insight into why control was violated." Table of Events:   Host                      Account           Action     LC200506         admin                Success  LC200507         admin                Failure    
Hi @Yogesh.Joshi, Please check out this documentation and see if it helps: https://docs.appdynamics.com/appd/22.x/latest/en/analytics/configure-analytics/collect-log-analytics-data
Hi @Sikha.Singh, Here is what I found on Backup and restoring on our AppD Docs site: https://docs.appdynamics.com/appd/onprem/latest/en/plan-your-deployment/physical-machine-controller-deployment-g... See more...
Hi @Sikha.Singh, Here is what I found on Backup and restoring on our AppD Docs site: https://docs.appdynamics.com/appd/onprem/latest/en/plan-your-deployment/physical-machine-controller-deployment-guide/controller-data-and-backups/controller-data-backup-and-restore
I have a panel in a dashboard that plot a trend line for last 24 Hrs. Now I wanna create a new alert query that should follow the trendline of panel. If the output of alert query doesn't match (no... See more...
I have a panel in a dashboard that plot a trend line for last 24 Hrs. Now I wanna create a new alert query that should follow the trendline of panel. If the output of alert query doesn't match (not exactly but to an extent) the pattern of panel query then it should trigger an alert. 
Can you tell us more about this setting?  The inputs.conf.spec file says setting the value to "indexQueue" sends data 'directly into the index', implying no parsing is done (is that even possible?). ... See more...
Can you tell us more about this setting?  The inputs.conf.spec file says setting the value to "indexQueue" sends data 'directly into the index', implying no parsing is done (is that even possible?).  Under what conditions would we use indexQueue?
I've recently been advised that our organization is intending to do away with the production domain where our current Splunk cluster resides, and move everything over two the other domain in use. Thi... See more...
I've recently been advised that our organization is intending to do away with the production domain where our current Splunk cluster resides, and move everything over two the other domain in use. This implementation does currently have nodes in two different domains, and the domain to go away happens to house both our Cluster Manager and four indexers in a two-site configuration running Splunk Enterprise 9.1.1. I don't yet have all the details (ie, is the IP/hostname changing or not) but in an effort to do some pre-emptive housecleaning and change the 'serverName' on one of the indexers in advance to go from FQDN to just the hostname, I got CM complaints that it couldn't rejoin the cluster due to the GUID belonging to another indexer.   01-16-2024 13:43:03.307 +0000 ERROR ClusterMasterPeerHandler [25028 TcpChannelThread] - Cannot add peer=X.X.X.X mgmtport=8089 (reason: Peer with guid=<GUID> is already registered and UP).   This error feels a little bit like a chicken/egg situation. Essentially I just had put the CM into maintenance-mode, stopped the peer, updated serverName in server.conf and started it back up. Perhaps I should have used 'splunk offline' vs 'splunk stop' here? This has me thinking the operation we're about to undertake is a fairly complex one. I haven't been able to find any relatively recent posts about doing something similar aside from a 2016 blog post that makes no mention of GUID and presume it was referring to stand-alone indexers vs clustered. Changing the GUID is presumably a non-starter due to the existing buckets all referencing it in their names... Long story short, I'm looking for an order of operations and some dos/donts for an undertaking like this.
Hi @Abdulrahman.Kazamel, Thanks for sharing your solution!
We were able to resolve this issue by editing the UI file so that the missing Teams Call QoS page would display.  Settings > User Interface > Navigation Menus > microsoft_cloud_app The Call Record ... See more...
We were able to resolve this issue by editing the UI file so that the missing Teams Call QoS page would display.  Settings > User Interface > Navigation Menus > microsoft_cloud_app The Call Record Monitoring collection was commented out.
I have to trim ITSI KV store collection size. I have created a local itsi_notable_event_retention.conf file in $SPLUNK_HOME/etc/apps/SA-ITOA/local/. I override the default values of retentionTimeInSe... See more...
I have to trim ITSI KV store collection size. I have created a local itsi_notable_event_retention.conf file in $SPLUNK_HOME/etc/apps/SA-ITOA/local/. I override the default values of retentionTimeInSec to 3 months. However the no of objects in the collection are still growing and hence the collection size. How do I trim the collection size?  I followed this document Modify notable event KV store collections in ITSI - Splunk Documentation. Please assist.
If you're using the IN clause you need to provide, as the message says, a list of literals. So you should do something IN ("val1", "val2", "val3) You can't give a list of conditions as you apparent... See more...
If you're using the IN clause you need to provide, as the message says, a list of literals. So you should do something IN ("val1", "val2", "val3) You can't give a list of conditions as you apparently tried to do
No. It can be a bit misleading but it shows that TLS isn't properly configured on this port. With TLS you should have gotten a server certificate and all the gory encryption protocols details. Also ... See more...
No. It can be a bit misleading but it shows that TLS isn't properly configured on this port. With TLS you should have gotten a server certificate and all the gory encryption protocols details. Also as you noticed yourself in the other comment - you can properly call curl requesting a simple non-encrypted http:// resource. Since Splunk doesn't serve both TLS-enabled and not-enabled services on the same port, it means you simply have to configure it.