All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Hi @ArgyTheo  >>> WARNING: web interface does not seem to be available! 1) looks like the 8000 port is not available. pls check if that port is being used by some other processes  2) check the top... See more...
Hi @ArgyTheo  >>> WARNING: web interface does not seem to be available! 1) looks like the 8000 port is not available. pls check if that port is being used by some other processes  2) check the top command for any Splunk processes that are running  3) Maybe the old process id still running and binding that port number 8000, if its ok, try to do a system restart itself.  4) pls check the splunkd.log for more details.  5) are these certs you self generated or third party generated
Hi! I have a saved historical data of some metric, from even before the agent got installed, is there any way to load it into the controller? So I can see this metric even for the time that I didn't... See more...
Hi! I have a saved historical data of some metric, from even before the agent got installed, is there any way to load it into the controller? So I can see this metric even for the time that I didn't have an agent installed? I don't see any API for that...   Thanks! -Dimitri )
Hi @phanTom  my version is 6.1.1
  Subject: Issue with Splunk server not starting after configuring TLS Description: I'm encountering an issue with my Splunk server after configuring TLS. Here's a summary of the steps I've taken:... See more...
  Subject: Issue with Splunk server not starting after configuring TLS Description: I'm encountering an issue with my Splunk server after configuring TLS. Here's a summary of the steps I've taken: Placed the certificate files (cert.pem, cacert.pem, key.pem) in the directory: /opt/splunk/etc/auth/mycerts/. Modified the /opt/splunk/etc/system/local/server.conf file with the following configurations: ⁠[sslConfig] enableSplunkdSSL = true sslVersions = tls1.2,tls1.3 serverCert = /opt/splunk/etc/auth/mycerts/cert.pem sslRootCAPath = /opt/splunk/etc/auth/mycerts/cacert.pem sslKeysfile = /opt/splunk/etc/auth/mycerts/key.pem   After restarting the Splunk server using the command ./splunk restart, the following messages were displayed: ⁠Starting splunk server daemon (splunkd)... Done  Waiting for web server at http://127.0.0.1:8000 to be available.... WARNING: web interface does not seem to be available!   Additionally, when checking the status with ./splunk status, the result is: splunkd is not running. Could someone assist me in troubleshooting this issue? I'm unsure why the Splunk server is not starting properly after enabling TLS. Thank you for your help!          
@PickleRick already describes what those are and how those can combine. Here is Splunk's official matrix which server roles can be on same splunk instance https://docs.splunk.com/Documentation/Splunk... See more...
@PickleRick already describes what those are and how those can combine. Here is Splunk's official matrix which server roles can be on same splunk instance https://docs.splunk.com/Documentation/Splunk/latest/Deploy/Manageyourdeployment With your size of environment I strongly propose separate MC (monitoring console) to see and monitor your environment. That could be virtual or physical machine based on your environment. But it should be separate SH not any regular as there shouldn't be any other users than Admins also setting node as MC changes search behaviour as you set all other nodes as a search peers for it. Personally I prefer to add all HFs as indexers into MC as that way I could check and monitor those via MC. BUT  strongly recommended that you must add separate custom group for those and also for your normal indexers which you start to use instead of indexer group. In that way you will see what you are expecting and those HFs values didn't disturb your statistics. Where to put LM? That will depends on your environments and your update plans. Have you also a test environment which are using the same LM or not? Where you are sending its logs? etc. One option is use CM or MC. But you must remember that LM is the 1st node which you should update to the new splunk version. See https://lantern.splunk.com/Splunk_Platform/Product_Tips/Upgrades_and_Migration/Upgrading_the_Splunk_platform for updating splunk. Anyhow when you are defining those roles for servers and add those to your environment I strongly recommended you to use CNAMEs or other way to separate role from physical node. In that way it's much easier later on to switch/migrate/what ever you need to a new physical node/site etc.
YES, BUT HOW? 
What do you mean? You want to see what queries your users run against your database server? Do you have apropriate logging set up in your database server? Do you ingest logs from that database server... See more...
What do you mean? You want to see what queries your users run against your database server? Do you have apropriate logging set up in your database server? Do you ingest logs from that database server to your Splunk installation? If an answer to all those questions is "yes", you should have your database activity logs in your Splunk environment and should be able to search through that data.
@meshorer what version of the platform are you using? In my 6.2 instance it's no longer an issue but I do recall it being an issue on a previous version or 2. 
1. appendcols just adds additional columns from the subsearch to the results of the main search without any correlation between the result sets. It just "glues" them together in the order return by r... See more...
1. appendcols just adds additional columns from the subsearch to the results of the main search without any correlation between the result sets. It just "glues" them together in the order return by respective searches. So it's usually not the best possible idea. The command has its uses but they are very rare. 2. Running real-time searches is generally not the best idea - it allocates a single CPU across every indexer participating in the search as well as your search-head. Also real-time searches have a lot of limitations (and you can only use some of the commands in your searches).
From Splunk, can I see the queries that have been implemented in the database? like update, delete, insert, etc.?
No. In order to manage a cluster a server must be cluster master. And that's all. In rare cases (in small environments) it can fulfill other roles as well but in general case it shouldn't do anythin... See more...
No. In order to manage a cluster a server must be cluster master. And that's all. In rare cases (in small environments) it can fulfill other roles as well but in general case it shouldn't do anything else. The SH deployer while it's theoretically also recommended to host it on a separate machine, it can be joined with another role (for example a small deployment server) since it's not very busy during normal SHC operations - it just pushes a SH config budle once in a while and that's it. Apart from that, the SHC is self-governing. Generally speaking - indexers are those components that are indexing data. And that's it. No other components should have the role of indexer assigned to them (some people try to assign indexer role to HFs since they are processing the data and there is no separate role for them) and in a well-designed environment no other servers than indexers should do local indexing. Search-heads are those components you can run searches against. You don't have to have searching capability on any other components than SHs and Monitoring Console (although you shouldn't use MC for "production" searching of course). In fact it's not uncommon to have CM/SH deployer/DS configured without webui (but yes, theoretically speaking, you can still dispatch searches via REST calls). I don't remember if all servers don't identify by default as search-heads since you can run a search against them - haven't set up a new MC for a while. So CM should defintely not have at least some of those roles. But just because your MC is apparently misconfigured it doesn't mean that your CM does all that. Firstly find out what your CM really does.
Hi, attached is a screen shot to show you what I mean is there a way to change the color if the text or the background in the console output? @inventsekar  @phanTom 
Correct, this is what is listed in the Monitoring Console as having all these roles. Our setup is as follows: 2 sites 9 Search Heads, clustered (5 in 1 site, 4 in the other) 8 indexers, clustered... See more...
Correct, this is what is listed in the Monitoring Console as having all these roles. Our setup is as follows: 2 sites 9 Search Heads, clustered (5 in 1 site, 4 in the other) 8 indexers, clustered (split evenly) 2 heavy forwarders (site 1 only) 1 cluster master I believe documentation mentions somewhere that in order to have a cluster master orchestrate clusters, it needs to take on the role of the cluster it's trying to orchestrate, ie search head or indexer. It doesn't actually fulfil those roles.
Hi @tlmayes, bug and known issues are synonyms. doe Splunk Support give an indication about when the known issue will be solved? Anyway, let me know if I can help you more. Ciao. Giuseppe P.S.:... See more...
Hi @tlmayes, bug and known issues are synonyms. doe Splunk Support give an indication about when the known issue will be solved? Anyway, let me know if I can help you more. Ciao. Giuseppe P.S.: Karma Points are appreciated
append is used for historical data but my data in real time so please suggest
Hello Team, as we delve into Splunk Attack Range 3.0, we're interested in understanding the MITRE ATT&CK tactics and techniques that can be simulated within this environment. If you have information ... See more...
Hello Team, as we delve into Splunk Attack Range 3.0, we're interested in understanding the MITRE ATT&CK tactics and techniques that can be simulated within this environment. If you have information on this, kindly share it with us. Thank you!
I have this query which is working as expected. There are two different body axs_event_txn_visa_req_parsedbody and axs_event_txn_visa_rsp_formatting and common between two is F62_2 (eventtype =axs_e... See more...
I have this query which is working as expected. There are two different body axs_event_txn_visa_req_parsedbody and axs_event_txn_visa_rsp_formatting and common between two is F62_2 (eventtype =axs_event_txn_visa_req_parsedbody "++EXT-ID[C0] FLD[Authentication Program..] FRMT[TLV] LL[1] LEN[2] DATA[01]") OR eventtype=axs_event_txn_visa_rsp_formatting | rex field=_raw "(?s)(.*?FLD\[Acquiring Institution.*?DATA\[(?<F19>[^\]]*).*)" | rex field=_raw "(?s)(.*?FLD\[Authentication Program.*?DATA\[(?<FCO>[^\]]*).*)" | rex field=_raw "(?s)(.*?FLD\[62-2 Transaction Ident.*?DATA\[(?<F62_2>[^\]]*).*)" | rex field=_raw "(?s)(.*?FLD\[Response Code.*?DATA\[(?<VRC>[^\]]*).*)" | stats values(txn_uid) as txn_uid, values(txn_timestamp) as txn_timestamp, values(F19) as F19, values(FCO) as FCO, values(VRC) as VRC by F62_2 | where F19!=036 AND FCO=01 now lets say i want to rewrite this query using appendcol/substring. something like this. TID from axs_event_txn_visa_req_parsedbody the resulted output should be passing to another query so i can corresponding log For example Table -1  Name Emp-id Jayesh 12345 Table Designation Emp-id Engineer 12345 use Emp-id from table-1 and get the destination from table-2, similarly TID is the common field between two index, i want to fetch VRC using TID from Table-1 index=au_axs_common_log source=*Visa* "++EXT-ID[C0] FLD[Authentication Program..] FRMT[TLV] LL[1] LEN[2] DATA[01]" | rex field=_raw "(?s)(.*?FLD\[62-2 Transaction Ident.*?DATA\[(?<TID>[^\]]*).*)" |appendcols search [ index=au_axs_common_log source=*Visa* "FORMATTING:" | rex field=_raw "(?s)(.*?FLD\[62-2 Transaction Ident.*?DATA\[(?<TID>[^\]]*).*)" |rex field=_raw "(?s)(.*?FLD\[Response Code.*?DATA\[(?<VRC>[^\]]*).*)" | stats values(VRC) as VRC by TID ]
If the dropdown is populated by a search, look at the search being run and then you can determine if that user can see the data being searched. Ask the user to manually run the search. Look at any ... See more...
If the dropdown is populated by a search, look at the search being run and then you can determine if that user can see the data being searched. Ask the user to manually run the search. Look at any index constraints for the roles the user belongs to.  
Hello, I have a dashboard where the drop down list is working for me as i have splunk admin access where as the same drop down list is not populating for a user with splunk user level access. How d... See more...
Hello, I have a dashboard where the drop down list is working for me as i have splunk admin access where as the same drop down list is not populating for a user with splunk user level access. How do i need to troubleshoot this issue? Thanks
Hi, I am creating a Dashboard and using the Dashboard Studio template, and previously I developed a Splunk Visualization. How can I define a Splunk Visualization on Dashboard Studio? Because by d... See more...
Hi, I am creating a Dashboard and using the Dashboard Studio template, and previously I developed a Splunk Visualization. How can I define a Splunk Visualization on Dashboard Studio? Because by default, I can only choose from the available Splunk Visualizations that Splunk has provided.