All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Data is not onboarded with field extracted. 
props.conf [delinea:secretserver] category = Custom description = Secret Server Logs EXTRACT-event_id_name = \|Secret Server\|[^\|]*\|(?<event_id>[^\|]*)\|(?<event_name>[^\|]*)\| #REPORT-key_value_p... See more...
props.conf [delinea:secretserver] category = Custom description = Secret Server Logs EXTRACT-event_id_name = \|Secret Server\|[^\|]*\|(?<event_id>[^\|]*)\|(?<event_name>[^\|]*)\| #REPORT-key_value_pair = key_value_pair KV_MODE = auto  
I have a python script which talks to database and get the data in json format. Now I need to create a dashboard in splunk out of the data after retrieving in tabular format.
It looks like you just want to reformat the JSON output - I am not sure Splunk is the right tool for this. Have you considered using a scripting or text processing language, e.g. perl, awk, python, e... See more...
It looks like you just want to reformat the JSON output - I am not sure Splunk is the right tool for this. Have you considered using a scripting or text processing language, e.g. perl, awk, python, etc.?
This is some experimenting I have done following the youtube video above. There is some other work as i would like to get the gap between any date ranges to be used in an average calculation, once i... See more...
This is some experimenting I have done following the youtube video above. There is some other work as i would like to get the gap between any date ranges to be used in an average calculation, once i have this timepicker issue sorted. <form> <label>SO-testing</label> <search> <query>|makeresults</query> <earliest>$time.earliest$</earliest> <latest>$time.latest$</latest> <progress> <eval token="toearliest">strptime("$job.earliestTime$","%Y-%m-%dT%H:%M:%S.%3N+%z")</eval> <eval token="tolatest">strptime("$job.latestTime$","%Y-%m-%dT%H:%M:%S.%3N+%Z")</eval> <eval token="tokgap"></eval>(($job.latestTime$-$job.earliestTime$)/86400) <set token="jobearliest">$job.earliestTime$</set> <set token="joblatest">$job.latestTime$</set> </progress> </search> <fieldset submitButton="false"> <input type="time" token="time"> <label>timepicker</label> <default> <earliest>-48h@h</earliest> <latest>now</latest> </default> </input> </fieldset> <row> </row> <row> <panel> <table> <title>token values</title> <search> <query> | makeresults |eval timeTokenearliest="$time.earliest$" |eval timeTokenlatest="$time.latest$" |eval gap=timeTokenlatest-timeTokenearliest |eval jobearliest = "$jobearliest$" |eval joblatest = "$joblatest$" |eval toearliest ="$toearliest$" |eval tolatest ="$tolatest$" |eval gapday = tostring(gap,"duration") |eval gapday1 = gap/86400 |eval reltimeearl = relative_time(now(),"$time.earliest$") |eval reltimelate = relative_time(now(),"$time.latest$") |table _time reltimeearl reltimelate timeTokenearliest timeTokenlatest gap gapday gapday1 tokgap jobearliest joblatest toearliest tolatest </query> <earliest>$time.earliest$</earliest> <latest>$time.latest$</latest> </search> <option name="drilldown">none</option> </table> </panel> </row> </form>  
Hi @richgalloway , Could you pls make changes as you requested. This is the regex used in the tranforms https://regex101.com/r/YhoZHW/1 My transforms looks like  [key_value_pair] REGEX =... See more...
Hi @richgalloway , Could you pls make changes as you requested. This is the regex used in the tranforms https://regex101.com/r/YhoZHW/1 My transforms looks like  [key_value_pair] REGEX = (\w+)=(.*?)(?=\s\w+=|$) FORMAT = $1::$2 props.conf [delinea:secretserver] category = Custom description = Secret Server Logs EXTRACT-event_id_name = \|Secret Server\|[^\|]*\|(?<event_id>[^\|]*)\|(?<event_name>[^\|]*)\| REPORT-key_value_pair = key_value_pair # Field renames FIELDALIAS-cs1 = cs1 as modified_role_name # FIELDALIAS-cs1label = cs1label as modified_role_name FIELDALIAS-cs2 = cs2 as user_or_group_name # FIELDALIAS-cs2label = cs2label as user_or_group_name FIELDALIAS-cs3 = cs3 as folder_name # FIELDALIAS-cs3label = cs3label as folder_name FIELDALIAS-cs4 = cs4 as source_user FIELDALIAS-fname = fname as target_item FIELDALIAS-rt = rt as event_time Thanks..
Is this what you mean? | stats dc(username) by type
For Studio, try absolute layout.
If I recall correctly, I had issues with earlier versions of Splunk, however, I am unable to reproduce any errors at the moment. Please share your dashboard source code in a code block </>
Splunk HEC will not accept events on the /event endpoint if they are not valid JSON.  I believe an error will be returned in that case, however.
Here is what I am attempting to do: I am trying to calculate the distinct count of the 'type' of users that are active. In my log files all of my users have a user name that follows this pattern:  ... See more...
Here is what I am attempting to do: I am trying to calculate the distinct count of the 'type' of users that are active. In my log files all of my users have a user name that follows this pattern:  ABCD.aUserName I am trying to calculate how many distinct users there are that are active for each 'type' where in the above example ABCD is the type. First looking for high level approach ideas and want to dig into it myself to see what I can get to work but I just am not able to wrap my noodle around how to even approach it ? I can extract the 'type' and the 'username' but if I have two extracted fields how do I correlate the two to be able to perform a count of dc(usernames) by type ?
What is your question?  We need a lot more information before we can help.  What help do you need?  What is the dashboard expected to do?  Is the data already onboarded with fields extracted?  What ... See more...
What is your question?  We need a lot more information before we can help.  What help do you need?  What is the dashboard expected to do?  Is the data already onboarded with fields extracted?  What have you tried so far and what have been the results?
I have a sample data something like below.      { "Year": { "Top30RequesterInOneYear": { "Bob": 22, "Marry": 12 }, "TotalRequestCountInOneYear": { "9": "K", "10": "C" }, "Top10ActionInOneYear": { ... See more...
I have a sample data something like below.      { "Year": { "Top30RequesterInOneYear": { "Bob": 22, "Marry": 12 }, "TotalRequestCountInOneYear": { "9": "K", "10": "C" }, "Top10ActionInOneYear": { "31": "update table", "33": "Display log" } }, "Month": { "Top30RequsterInOneMonth": { "Foo": 3, "Bob": 6 }, "TotalRequestCountInOneMonth": { "1": "K", "5": "C" }, "Top10ActionInOneMonth": { "10": "Display log", "11": "update table" } }, "Week": { "Top30RequesterInOneWeek": { "Bob": 6 }, "TotalRequestCountInOneWeek": { "15": "C" }, "Top10ActionInOneWeek": { "3": "update table", "7": "display reboot" } } }   The output is expected is as below. Can someone please help me on this. Top30RequesterInOneYear Name | Count Bob 22 Marry 12 TotalRequestCountInOneYear Count | Status 9 K 10 C Top10ActionInOneYear Count | Action 31 update table 33 Display log Top30RequsterInOneMonth Name | Count Foo 3 Bob 6 TotalRequestCountInOneMonth Count | Status 1 K 6 C Top10ActionInOneMonth Count | Action 10 display log 11 update table Top30RequesterInOneWeek Name | Count Bob 6 TotalRequestCountInOneWeek Count | Status 15 C Top10ActionInOneWeek Count | Action 3 update table 7 display reboot
Versus opening a ticket with Cisco, I was hoping to see if the community could point me in the correct direction. I'm not particularly skilled but have tried some of the various options that were sim... See more...
Versus opening a ticket with Cisco, I was hoping to see if the community could point me in the correct direction. I'm not particularly skilled but have tried some of the various options that were similar to my problem but with no luck. Splunk version=8.2.3 OS=RHEL 8 Plugin=Cisco Nexus 9k Add-on for Splunk Enterprise from splunkbase. I can get the plugin to connect using http as the connection method. I'm trying to get the https method to work. I can curl to the switch in question using the cert I generated (openssl req -x509 -newkey rsa:4096 -keyout hostkey.pem -out hostcert.pem -sha256 -days 30 -nodes -subj "/C=US.../CN=host") then imported to the switch. ( curl --verbose --cacert hostcert.pem https://host) So at this point I'm confident that the cert and key are installed correctly on the switch and working as expected. The error I'm receiving (truncated): Caused by SSLError(SSLCertVerificationError [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self signed certificate My guess is that I need to install the certificate somewhere within the /opt/splunk/etc/auth directory , but I'm not sure. I saw some posts that said add to this file or copy into directory, but I can't find the one that works. Any insight is appreciated. Thanks
We cannot get all data in one single table. Alternatively we had to do it in separate panels. For studio can you suggest sone codes for the panels or cells alignment.
Try creating a search which returns all the data in a single table. Alternatively, you may be able to force the alignment of the panels in Studio
Splunk Enterprise Version:8.2.6 Build:a6fe1ee8894b
The column in the lookup - essentially, if there is no match in the lookup, the output field will be null.
Thank you for your explanation.  I will consider this in my architecture.
Which version of Splunk are you using?