All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

When I disable the input_file/output_file within team roles, Team members can still use inputlookup, outputcsv, and search results.
I have a query to fetch Kernel version from all the Linux servers . We update the Kernel Patch every quarter . I have to hardcode the kernel versions in the search query 3.10.0-1160.92.1.el7.x86_64  ... See more...
I have a query to fetch Kernel version from all the Linux servers . We update the Kernel Patch every quarter . I have to hardcode the kernel versions in the search query 3.10.0-1160.92.1.el7.x86_64  every quarter .  There are 3 versions  which I need to hardcode in the search query . Is there any specific way where we can update the query automatic . 
I have a simple drilldown on my dashboard that users can click on the cell that links to an external website. How can I get Splunk to log the URL that the users clicked?  Is it possible to achieve?... See more...
I have a simple drilldown on my dashboard that users can click on the cell that links to an external website. How can I get Splunk to log the URL that the users clicked?  Is it possible to achieve? Thanks a  lot.
OK, so you want to find events either where id is XYZ AND finished duration is > N OR  id is XYZ OR finished duration is > N Assuming it is AND then try this source=abc type=Changed ((msg="c... See more...
OK, so you want to find events either where id is XYZ AND finished duration is > N OR  id is XYZ OR finished duration is > N Assuming it is AND then try this source=abc type=Changed ((msg="consumed event" AND event_id="*") OR (msg=" finished processing" AND duration>1) | rename event.data{}.id as id | where id="XYZ" | stats avg(duration) Not totally sure if event_id and event.data{}.id are the same thing and if your finished processing events will have the event.data.id field - if not then you have to change the where clause. Without seeing your data, it's not clear if the above will give you what you want, but the principle is the same in that you just need to combine the data types in a single query, so you have OR for the msg=XX statements. The stats command needs to combine the events so that it can determine if there are both events for the result so you don't get events that ONLY have duration > 1 If you can give an example of the 2 events you want to collect together that would help
Hi @ITWhisperer  Sorry for the late response. Its works after few modifications in my code. Thanks for your support.
Dashboard, with search query which produces output table format.
Sorry @bowesmana i just changed the Query #1 slightly: Query #1 source=abc type=Changed msg="consumed event" event_id="*" | rename event.data{}.id id | where id="XYZ" Query #2 source=abc type=Cha... See more...
Sorry @bowesmana i just changed the Query #1 slightly: Query #1 source=abc type=Changed msg="consumed event" event_id="*" | rename event.data{}.id id | where id="XYZ" Query #2 source=abc type=Changed" msg=" finished processing"  duration>1 | stats avg(duration) I want to join the two above queries and at the end show the avg(duration). duration is a field from the second query. Thanks!
Elegant solution. I'll take a look with our prod data and respond here. Thanks again the the reply.
Thanks @bowesmana  for your help. So here are two queries: Query #1 source=abc type=Changed msg="consumed event" event_id="*" |  Query #2 source=abc type=Changed" msg=" finished processing"  dur... See more...
Thanks @bowesmana  for your help. So here are two queries: Query #1 source=abc type=Changed msg="consumed event" event_id="*" |  Query #2 source=abc type=Changed" msg=" finished processing"  duration>1 | stats avg(duration) I want to be able to do the above two searches in one. based on the event_id being the same and at the end displaying the average of the duration which is the field from the second query. Thanks!
If you want to get a lot of flexibility with maps, then use the maps+ vizualisation https://splunkbase.splunk.com/app/3124 You have a number of options for defining colour by adding your colour val... See more...
If you want to get a lot of flexibility with maps, then use the maps+ vizualisation https://splunkbase.splunk.com/app/3124 You have a number of options for defining colour by adding your colour values to the rows of your results  
You need to change your search a bit index="index1" | lookup lookup1 ip_address as src_ip OUTPUT ip_address as address | where cidrmatch(address, dest_ip) i.e. you don't really need OUTPUTNEW unle... See more...
You need to change your search a bit index="index1" | lookup lookup1 ip_address as src_ip OUTPUT ip_address as address | where cidrmatch(address, dest_ip) i.e. you don't really need OUTPUTNEW unless you want to prevent an existing address field from being overwritten, but then the where clause uses the cidrmatch command where you give the CIDR range as the first parameter. This assumes that your lookup1 is a lookup definition and you have defined the match type as CIDR(ip_address)  
What is the visualisation you are using in the dashboard?
You could start with something like this source=abc type=Change (msg=" consumed" OR msg=" finished") event_type="*" | stats values(msg) as msgs by event_type | where mvcount(msgs)=2 where you searc... See more...
You could start with something like this source=abc type=Change (msg=" consumed" OR msg=" finished") event_type="*" | stats values(msg) as msgs by event_type | where mvcount(msgs)=2 where you search for all events with either event type and then only find those that have both consumed AND finished. It will depend on what you want to do with the results as to what your search will look like - can you say what your goal is with the results?
Check out the map command.
Can someone please help me with this. So I have the following query: source=abc type=Change msg=" consumed" event_type="*" Now for each of the above searches i need to do the following: source=ab... See more...
Can someone please help me with this. So I have the following query: source=abc type=Change msg=" consumed" event_type="*" Now for each of the above searches i need to do the following: source=abc AND type=Change AND msg=" finished" event_type= above event type Basically for each first one do another search for the same event_type  What would the full query look like? Thanks
The query field (like the search field) are special cases in subqueries as they are not passed to the outer search, only their values are. This is why the final query field is empty.
Hi all i have the below query where i have a lookup  file with Error messages im trying to match the error messages in the lookup and then matching those in the rawdata and showing in table. However... See more...
Hi all i have the below query where i have a lookup  file with Error messages im trying to match the error messages in the lookup and then matching those in the rawdata and showing in table. However my final result query field is coming as empty rest all are populating. Need help in the query i was trying to add before the table command | lookup ErrorMessage.csv  query OUTPUT query but not working need help  index=abc host="LINUX123" " source="/new/dir/apps/servers/service*.log"  "Error data*"  [ | inputlookup ErrorMessage.csv | fields + ErrorMessage | rename ErrorMessage as query] | table _time,host,query, _raw   lookup file content ErrorMessage.csv File Not Found Error data in client transacton   thanks in advance   
Hi with that data there shouldn’t be any needs for anything else than default line breaker. It seems to be an event per line. Also \P should be just P as those two has totally different meanings. ... See more...
Hi with that data there shouldn’t be any needs for anything else than default line breaker. It seems to be an event per line. Also \P should be just P as those two has totally different meanings. r. Ismo
Have you try to use index_field_list on transforms.conf for CSV based lookup and/or accelerated_fields on collections.conf for kvstore based lookup?
How to add the LINE_BREAKER in propd .conf for the below events to get it split to different events . Currently these are comign as combines together    Path =567 xcss sdsf   Path = 5673 dvgsdbdv ... See more...
How to add the LINE_BREAKER in propd .conf for the below events to get it split to different events . Currently these are comign as combines together    Path =567 xcss sdsf   Path = 5673 dvgsdbdv  v Path = 43343 dvddv    I tried LINE_BREAKER = ([\r\n]+)\Path       SHOULD_LINEMERGE = FALSE But didnt worked