All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Hi, Instead of passing the username and password in a plain text format, I was trying the basicauth extension for authentication and monitoring the oracledb and require some assistance, as after add... See more...
Hi, Instead of passing the username and password in a plain text format, I was trying the basicauth extension for authentication and monitoring the oracledb and require some assistance, as after adding the below details in the agent_config.yml , The splunk otel collector is not starting up and am seeing error. Kindy help. In agent_config.yml extensions:    basicauth:    htpasswd:        file: /etc/otel/collector/.htpasswd receivers:   oracledb/demo:   protocols:      http:        auth:           authenticator: basicauth    endpoint: <hostname:port>    service: <DBname> service:    metrics:        receivers: [oracledb/demo]    
thanks! i don't get all cells=0, no results when using the where clause (if i remove `where` i see that cells==0 exist) . i found a ticket: https://community.splunk.com/t5/Splunk-Search/How-to-sh... See more...
thanks! i don't get all cells=0, no results when using the where clause (if i remove `where` i see that cells==0 exist) . i found a ticket: https://community.splunk.com/t5/Splunk-Search/How-to-show-only-fields-over-0/m-p/164589 maybe i can't do it with timechat? | eval _time=strptime(TimeStamp, "%F %T") | timechart span=12h count(Name) AS CountEvents by machine cont=t usenull=f useother=f | where CountEvents=0
@Bisho-Fouad - Why do you want to create input on all heavy forwarders?  * I think this will duplicate the data. There is no necessity to create index on all heavy forwarders. Only where you are co... See more...
@Bisho-Fouad - Why do you want to create input on all heavy forwarders?  * I think this will duplicate the data. There is no necessity to create index on all heavy forwarders. Only where you are configuring the input.
Hi @darkhorse91, you have to use a subsearch, with the limitation that you cannot have more than 50,000 results from the subsearch,  if: the current search is on index=current and runs on the las... See more...
Hi @darkhorse91, you have to use a subsearch, with the limitation that you cannot have more than 50,000 results from the subsearch,  if: the current search is on index=current and runs on the last day, the retrospetive search runs on index=retrospective and the last 30 days,  the common field is my_field and it has the same name in both the searches, you could try something like this: index=retrospective earliest=-30d latest=now [ search index=current earliest=-24h latest=now) | dedup my_field | fields my_field ] You have to adapt my approach to your searches. Ciao. Giuseppe  
Hi @ITWhisperer - thanks a lot, this worked like a charm.
I am working on building a query to search retrospectively and potentially run a report. Let's say the first search is index=some_index "inconsistencies" | dedup someField and the second is index... See more...
I am working on building a query to search retrospectively and potentially run a report. Let's say the first search is index=some_index "inconsistencies" | dedup someField and the second is index=some_index "consistent" someField IN (fieldValuesFromPrevMsg) | dedup someField   I want to check whether a field seen in the first search is part of the second search (which has a slightly different query but has same field) in a custom time frame.(could be in the future relative to the first search or in the past) I'm new to splunk, can someone please help me with this?    
Hi @EricLBP   - I’m a Community Moderator in the Splunk Community.  This question was posted 11 years ago, so it might not get the attention you need for your question to be answered. We recommend ... See more...
Hi @EricLBP   - I’m a Community Moderator in the Splunk Community.  This question was posted 11 years ago, so it might not get the attention you need for your question to be answered. We recommend that you post a new question so that your issue can get the  visibility it deserves. To increase your chances of getting help from the community, follow these guidelines in the Splunk Answers User Manual when creating your post. Thank you! 
Hi, I am fetching data from service now add on to splunk for one of the service now cmdb table. While fetching the field name is splitting as below  How do i fix this
Hi @maayan, with this search you can list all the alerts | rest splunk_server=local /servicesNS/-/-/saved/searches | where alert_type!="always" | table title and with this search yu can list the ... See more...
Hi @maayan, with this search you can list all the alerts | rest splunk_server=local /servicesNS/-/-/saved/searches | where alert_type!="always" | table title and with this search yu can list the fired alerts index=_audit action="alert_fired" | rename ss_name AS title | join title [ | rest /services/saved/searches | table title, alert_threshold ] | timechart values(alert_threshold) AS alert_threshold count by title Ciao. Giuseppe
Which add-on are you talking about?
Hi, it's unclear from the app description about what this app allows for. Is it helping for radius configuration for splunk authentication ? Or is it for monitoring any radius server logs, even if ... See more...
Hi, it's unclear from the app description about what this app allows for. Is it helping for radius configuration for splunk authentication ? Or is it for monitoring any radius server logs, even if you don't use it within splunk ?
Use _time, then timechart will fill in the blanks for you | eval _time=strptime(TimeStamp, "%F %T") | timechart span=2h count(Name) by machine
Hi, I confirm link is dead and I've not found who to unsubscribe. Is there anyone who can help us ?
thanks! i use TimeStamp and not _time. how do i use it in my query?   | addinfo | fieldformat info_min_time=strftime(info_min_time,"%c") | fieldformat info_max_time=strftime(info_max_time,"%c") ... See more...
thanks! i use TimeStamp and not _time. how do i use it in my query?   | addinfo | fieldformat info_min_time=strftime(info_min_time,"%c") | fieldformat info_max_time=strftime(info_max_time,"%c") | where strptime(TimeStamp,"%F %T.%3N")>info_min_time AND strptime(TimeStamp,"%F %T.%3N")<info_max_time ```Divide the time to intervals ``` | eval TimeStamp_epoch = strptime(TimeStamp, "%F %T") | bin TimeStamp_epoch span=2d | eval interval_start = strftime(TimeStamp_epoch, "%F %T") | eval interval_end = strftime(relative_time(TimeStamp_epoch, "+2d"), "%F %T") | eval interval_end = if(strptime(interval_end, "%F %T") > now(), strftime(now(), "%F %T"), interval_end) | eval time_interval = interval_start . " to " . interval_end | chart count(Name) over machine by time_interval
It appears that two dimensional arrays are not easily handled (unless someone else knows differently), so you could try something like this: | spath output=pointlist path=series{}.pointlist{}{} | mv... See more...
It appears that two dimensional arrays are not easily handled (unless someone else knows differently), so you could try something like this: | spath output=pointlist path=series{}.pointlist{}{} | mvexpand pointlist | table pointlist | streamstats count as row | streamstats count(eval(row % 2==1)) as row | stats list(pointlist) as pointlist by row | sort 0 row | eval pointX = mvindex(pointlist,0) | eval pointY = mvindex(pointlist,1)
see my answer here: https://community.splunk.com/t5/Splunk-Enterprise-Security/threat-intelligence/m-p/673449#M11868 
Hi, Thanks! i will check. i dont have permission to install apps. i wonder if there is an internal query to get all alerts and their results
Should I expect that the threat intelligence that is streaming in is being ran against the events in my environment automatically?  I would not expect that, most vendors don't intergrade with th... See more...
Should I expect that the threat intelligence that is streaming in is being ran against the events in my environment automatically?  I would not expect that, most vendors don't intergrade with the Splunk ES threat intel framework they just make the TI data available in Splunk via a lookup file or by putting it in a index. If you want to be sure the TI info is flowing into the threat intel framework I suggest you add the data there either by revering to the app created lookup (if any), by creating your own lookup from the indexed data or by adding a TAXII/STIX feed. See for more info: Splunk Latern  Splunk Docs  
OK, so have you tried what I suggested?
The query is used in a dashboard panel as a statistical table with single row.  the data is usually  not available on regular intervals. Hence we would like to show the last available data instead of... See more...
The query is used in a dashboard panel as a statistical table with single row.  the data is usually  not available on regular intervals. Hence we would like to show the last available data instead of “no results found” when there is no data for the selected default time range that we have set.