All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

I think you may have been told this before but if you want a time element in your visualisation, it needs to be in your results table. Your search is removing the _time field (or not including it). Y... See more...
I think you may have been told this before but if you want a time element in your visualisation, it needs to be in your results table. Your search is removing the _time field (or not including it). You need to rework your search accordingly.
@ITWhisperer Thats also not workng. See the below events from the search and want the expected visualization.  
Is there any mechanism to monitor a salesforce URL beyond single sign on. We try to setup using Splunk website monitoring. this app directly monitoring single sign on page and not actual page. Please... See more...
Is there any mechanism to monitor a salesforce URL beyond single sign on. We try to setup using Splunk website monitoring. this app directly monitoring single sign on page and not actual page. Please suggest a method to monitor an URL beyond single sign on.  Thanks.           
For example: If "fieldX" has many possible values(ex. 1 2 3 4 a b c d ...) we want to have Splunk send an alert email whenever any of these values are seen more than 10 times in 60mins.   Does anyo... See more...
For example: If "fieldX" has many possible values(ex. 1 2 3 4 a b c d ...) we want to have Splunk send an alert email whenever any of these values are seen more than 10 times in 60mins.   Does anyone know a search that will work for this? Thanks in advance!
Do you need to return output from one section of a chain search to another, like when writing a function in a programming language I've assumed that a chained search would, as a user, act in a simil... See more...
Do you need to return output from one section of a chain search to another, like when writing a function in a programming language I've assumed that a chained search would, as a user, act in a similar fashion to concatenating both searches, but with a really DRY efficiency - so superb use for dashboarding as often the material being presented shared a common subject. There are certain queries I am running that break when used in a chained order - am I missing some kind of return function needed?
| timechart span=1d count by group_name
| rex field=Body "(?ms).*Access Mask.*\sAccesses:\s(?<Accesses2>.+?)Access\sCheck Results\:.*"
@ITWhisperer group_name is the raw.location and in the visualisation they are using. I want the same Visualisation as mentioned earlier.
Hello all, Can someone help me with where I can download the Splunk Tools 6.3 package for linux?
Try something like this | rex mode=sed field=errorMessage "s/transactionId=[^:]+:/transactionId=txid:/g"
The visualisation you said you wanted doesn't have raw.location in. Please clarify what you want in your visualisation, what fields you have and how you want to use them
So when an upstream error is logged in our splunk it has two fields that contain all the information about the error. So I created a nice little query to show a simple table of the two fields: stats... See more...
So when an upstream error is logged in our splunk it has two fields that contain all the information about the error. So I created a nice little query to show a simple table of the two fields: stats values(errorMessage) by errorCode However for one of the error messages in the errorMessage field it can contain an id for the current transaction with the server. So when we scale up and release this table will contain hundreds of values for a single error type. Examples of the types of errors (obviously sanitized without actual data): errorCode: Not Required, errorMessage: [Error: Not Required] 400: Downgrade for transactionId=00000000000: type=01 country=GB errorCode: Not Required, errorMessage: [Error: Not Required] 400: Downgrade for transactionId=00000000001: type=01 country=GB errorCode: Invalid Request Parameters, errorMessage: [Error: Invalid Request Parameters] 400: Value of 30 for field not valid errorCode: undefined, errorMessage: [Error: undefined] 400: undefined errorCode: undefined, errorMessage: [Error: undefined] 500: undefined So I would like the values(errorMessage) to group the first two items as a single entry so if I could create a new variable without the transactionId or replacing it with the same value, the information would be much easier to read and present for error triage in our dashboard because the transaction id is not important for seeing an error trend. Not super great with Regex but I feel there is something that would work to just find a field of numbers with a specific length and remove them or replace them. Is that possible? Thanks
@ITWhisperer  No results, I think strcat is working together with location and group_name  
| timechart span=1d count by location
@ITWhisperer  Below is the visualization I am getting after changing from stats to chart.  
Hi @phanTom  how can I map the output datapaths in the app's JSON file ? Is there any document link or video that can be assistance for that matter?
Introspection endpoint descriptions - Splunk Documentation normalized_load_avg_1min Normalized load average of runnable_process_count across all cores (cumulative_load_avg / number_of_cores). Th... See more...
Introspection endpoint descriptions - Splunk Documentation normalized_load_avg_1min Normalized load average of runnable_process_count across all cores (cumulative_load_avg / number_of_cores). This value is not reliable for a VM guest.
We have used this app as a solution to add the forwarder name: https://github.com/aholzel/TA-add_forwarder_name 
Thank you so much! This is UUID actually but I have added a pattern and it works perfectly!
Hello, The rex command to catch and group the Accesses multi values are not working even though the results in regex101 are fine. Could you guys tell me what I am missing? Test Log:   12/12/2012 ... See more...
Hello, The rex command to catch and group the Accesses multi values are not working even though the results in regex101 are fine. Could you guys tell me what I am missing? Test Log:   12/12/2012 04:25:13 PM LogName=Security EventCode=5145 EventType=0 ComputerName=test.corp SourceName=Microsoft Windows security auditing. Type=Information RecordNumber=2049592111 Keywords=Audit Success TaskCategory=Detailed File Share OpCode=Info Message=A network share object was checked to see whether client can be granted desired access. Subject: Security ID: User\Test Account Name: Test Account Domain: Test Logon ID: 0x117974CE Network Information: Object Type: File Source Address: ::1 Source Port: 51234 Share Information: Share Name: \\*\C$ Share Path: \??\C:\ Relative Target Name: Users\Test\Desktop Access Request Information: Access Mask: 0x100081 Accesses: SYNCHRONIZE ReadData (or ListDirectory) ReadAttributes Access Check Results: -     Splunk Rex Query:   ... | rex field=Body ".*Access Mask.*\sAccesses:\s(?<Accesses2>.+?)Access\sCheck Results\:.*"     Thanks, Regards,