All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Hi did you resolved this?
I want to change the msg for a log i.e <list > <Header>.....</Header> <status> <Message>Thuihhh_4y3y27y234yy4 is pending</Message> </status> </list> to <list > <Header>.....</He... See more...
I want to change the msg for a log i.e <list > <Header>.....</Header> <status> <Message>Thuihhh_4y3y27y234yy4 is pending</Message> </status> </list> to <list > <Header>.....</Header> <status> <Message>request is pending</Message> </status> </list>   how can i achieve using rex+sed commands in splunk
I want to extract the  following information make it as a field as "error message" . index=os source="/var/log/syslog" "*authentication failure*" OR "Generic preauthentication failure" Events e... See more...
I want to extract the  following information make it as a field as "error message" . index=os source="/var/log/syslog" "*authentication failure*" OR "Generic preauthentication failure" Events example : Nov 28 01:02:31 server1 sssd[ldap_child[12010]]: Failed to initialize credentials using keytab [MEMORY:/etc/krb5.keytab]: Generic preauthentication failure. Unable to create GSSAPI-encrypted LDAP connection. Nov 28 01:02:29 server2  proxy_child[1939385]: pam_unix(system-auth-ac:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10.177.46.57 user=hippm
Hello there, I would like to convert the  default time to the local country timezone and place the converted timezone next to the default one The defaut timezone is Central European time and based ... See more...
Hello there, I would like to convert the  default time to the local country timezone and place the converted timezone next to the default one The defaut timezone is Central European time and based on the country name available in the report, need to conver the timezone. I guess i need to have a lookup table which the coutryname and the timezone of that country Timestamp CountryCode CountryName Region 2023-10-29T13:15:51.711Z BR Brazil Americas 2023-10-30T10:13:19.160Z BH Bahrain APEC 2023-10-30T19:15:24.263Z AE Arab Emirates APEC  
Hi All, We have configured application log monitoring on windows application servers. The log path has a folder where all the _json files are stored. There are more that 300+ json files in each fold... See more...
Hi All, We have configured application log monitoring on windows application servers. The log path has a folder where all the _json files are stored. There are more that 300+ json files in each folder with different time stamps and dates. We have configured inputs.conf as shown below with ignoreOlderThan =2d so that Splunk should not consume more CPU/memory. But still we could see memory and CPU of the application server is going high. Kindly suggest best practice methods so that Splunk universal forwarder wont consume more CPU and memory.   [monitor://C:\Logs\xyz\zbc\*] disabled = false index = preprod_logs interval =300 ignoreOlderThan = 2d
now in props.conf [stream:ip] TRUNCATE = 100000 I will change to 0, I will check, I will return with the answer
Hi I want to inventory all Splunk tools related to artificial intelligence and observability Here is the list: Splunk AI Assistant - PREVIEW (formerly SPL Copilot) Splunk Machine Learning Too... See more...
Hi I want to inventory all Splunk tools related to artificial intelligence and observability Here is the list: Splunk AI Assistant - PREVIEW (formerly SPL Copilot) Splunk Machine Learning Toolkit (MLTK) Splunk App for Data Science and Deep Learning (DSDL) Splunk IT Service Intelligence Splunk App for Anomaly Detection Did I forget some tools? Thanks
I really thanks for your response! But I solved the problem with other solution. The solution is below https://community.splunk.com/t5/Splunk-Enterprise/Alert-manager-enterprise-Creation-of-events-... See more...
I really thanks for your response! But I solved the problem with other solution. The solution is below https://community.splunk.com/t5/Splunk-Enterprise/Alert-manager-enterprise-Creation-of-events-in-ind...
Okay, but how to add those extra fields that is my task. Is it possible to use eval command? If yes can you suggest me a query 
@tscroggins , None of your shared Regex patterns are working https://regex101.com/r/i5cas6/1 Can you pls share your applied regex in regex101.
Hi @SanjayReddy , That worked! I was able to go to Searches Reports & Alerts from settings and delete the alert from there. Thank you so much for your help!
Hi @Simon1  I feel there is not direct way to change the app context in UI also you are using splunk cloud. otherway is go to searches reports and alerts from settings  from their click on... See more...
Hi @Simon1  I feel there is not direct way to change the app context in UI also you are using splunk cloud. otherway is go to searches reports and alerts from settings  from their click on edit alet and clone  then you can change the app context  and , once clone the alert delete the alert with app in slack context  
If you don't see those other statuses in the results, then they don't exist as values of status in the data, because search... | stats count by status will give you all values for status that are p... See more...
If you don't see those other statuses in the results, then they don't exist as values of status in the data, because search... | stats count by status will give you all values for status that are present in the data.  
"Hey Splunk experts! I'm a Splunk newbie and working with data where running `stats count by status` gives me 'progress' and 'Not Started'. I'd like to include 'Wip progress' and 'Completed' in the r... See more...
"Hey Splunk experts! I'm a Splunk newbie and working with data where running `stats count by status` gives me 'progress' and 'Not Started'. I'd like to include 'Wip progress' and 'Completed' in the results. When running `stats count by status`. Desired output is: - Not Started - Progress - Wip Progress - Completed  Any tips or examples on how to modify my query to achieve this would be fantastic! Thanks 
Hi, I am trying to report on access requests to actual logins. I have a list of events from our systems of when users have logged in: | table _time os host user clientName clientAddress signature ... See more...
Hi, I am trying to report on access requests to actual logins. I have a list of events from our systems of when users have logged in: | table _time os host user clientName clientAddress signature logonType I have a list of requests which cover a time frame and potentially multiple logins to multiple systems: | table key host reporterName reporterEmail summary changeStartDate changeEndDate So i want a list of events, with any corresponding requests (could be none, so i can alert the user/IT) joining on host, user, and _time between changeStartDate and changeEndDate. I do have this working by using map (see below), but it's very slow and not operable over large datasets/times. There must be a better way. I had issues with matching on the time range, and where it may not have a match, and optional username matching based on OS. Does anyone have any ideas? Existing search: ...search... | table _time os host user clientName clientAddress signature logonType | convert mktime(_time) as epoch | sort -_time | map maxsearches=9999 search=" | inputlookup Request_admin_access.csv | eval os=\"$os$\" | eval outerHost=\"$host$\" | eval user=\"$user$\" | eval clientName=\"$clientName$\" | eval clientAddress=\"$clientAddress$\" | eval signature=\"$signature$\" | eval logonType=\"$logonType$\" | eval startCheck=if(tonumber($epoch$)>=tonumber(changeStartDate), 1, 0) | eval endCheck=if(tonumber($epoch$)<=tonumber(changeEndDate), 1, 0) | eval userCheck=if(normalisedReporterName==\"$normalisedUserName$\", 1, 0) | where host=outerHost | eval match=case( os==\"Windows\" AND startCheck==1 AND endCheck==1,1, os==\"Linux\" AND startCheck==1 AND endCheck==1 AND userCheck==1,1) | appendpipe [ | makeresults format=csv data=\"_time,os,host,user,clientName,clientAddress,signature,logonType,wimMatch $epoch$,$os$,$host$,$user$,$clientName$,$clientAddress$,$signature$,$logonType$,1\" ] | where match==1 | eval _time=$epoch$ | head 1 | convert ctime(changeStartDate) timeformat=\"%F %T\" | convert ctime(changeEndDate) timeformat=\"%F %T\" | fields _time os host user clientName clientAddress signature logonType key reporterName reporterEmail summary changeStartDate changeEndDate"  
Are you sure you set the environment variables for the Splunk service? How did you do that?
There might be several things wrong, not the destination index configuration. As @richgalloway already said - please create a new thread describing your configuration and problem. The problem in this... See more...
There might be several things wrong, not the destination index configuration. As @richgalloway already said - please create a new thread describing your configuration and problem. The problem in this thread has already been resolved. Let's keep the Answers nice and tidy
Hi, I mistakenly cloned an alert to the "Slack Alerts" app instead of the normal "Search & Reporting" app.  This alert is functioning and sending Slack messages when triggered. But the alert is in ... See more...
Hi, I mistakenly cloned an alert to the "Slack Alerts" app instead of the normal "Search & Reporting" app.  This alert is functioning and sending Slack messages when triggered. But the alert is in the wrong app. But worse is that the alert now appears in the "All Configurations" page. I am able to disable the alert but not able to remove it and I really need to remove it from the "All Configurations" page. I'm also not able to edit the alert in any way. Is it possible to remove the alert from the "All Configurations" page?   Thank you.
I don't know how it worked back in 6.1 but in "modern" versions if you're out of license (it expired), it's treated as if you had violations and your search is blocked. You can't just reset it. You n... See more...
I don't know how it worked back in 6.1 but in "modern" versions if you're out of license (it expired), it's treated as if you had violations and your search is blocked. You can't just reset it. You need active license to keep your Splunk searchable. And you need the reset license to unlock it.
@ITWhisperer I know that there isn't much traffic in this part of Answers but it's a question about Observability Cloud, not Splunk Enterprise/Cloud. (I don't know the right answer myself. Just point... See more...
@ITWhisperer I know that there isn't much traffic in this part of Answers but it's a question about Observability Cloud, not Splunk Enterprise/Cloud. (I don't know the right answer myself. Just pointing out so that you don't drift too far wrong way ;-)).