All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Hi @danspav/ @bowesmana  ,    Thanks for your response,    I has tried this way, still getting different values in URL Here is my URL after selection of pie chart,    &%26form.office_filter%3DF... See more...
Hi @danspav/ @bowesmana  ,    Thanks for your response,    I has tried this way, still getting different values in URL Here is my URL after selection of pie chart,    &%26form.office_filter%3DFront%20Office=& I'm getting %26, %3D instead for =  , %20 instead of space i had tried this way in actual info, <input type="multiselect" token="office_filter" searchWhenChanged="true"> <label>Front/Back office</label> <choice value="Front Office">Front Office</choice> <choice value="Back Office">Back Office</choice> <default>Front Office</default> <prefix>(</prefix> <suffix>)</suffix> <initialValue>Front Office</initialValue> <valuePrefix>"</valuePrefix> <valueSuffix>"</valueSuffix> <delimiter>,</delimiter> <change> <eval token="office_filter_drilldown">replace($form.office_filter$ + "","([^,]+),?","&amp;form.office_filter=$1")</eval> </change> </input> <drilldown> <link target="_blank">/app/antivirus_details?form.compliance_filter=$click.value$&amp;$office_filter_drilldown$&amp;form.machine=$machine$&amp;form.origin=$origin$&amp;form.country=$country$&amp;form.cacp=$cacp$&amp;form.scope=$scope$</link> </drilldown> Can you please ensure this! Thanks! Manoj Kumar S
Hi @duesser , good for you, see next time! Ciao and happy splunking Giuseppe P.S.: Karma Points are appreciated by all the contributors
hi yuanliu, Do you have any updates? We need filter out events where a user has only Eventcode=4776 over a while, and exclude events where 4770 or 4768, or 4624 precede 4776, because we think that ... See more...
hi yuanliu, Do you have any updates? We need filter out events where a user has only Eventcode=4776 over a while, and exclude events where 4770 or 4768, or 4624 precede 4776, because we think that this situation is reasonable and that only the presence of 4776 alone is illegal.
Wait a second. Whenever I see "compare" and "appendcols" in the same sentence I raise my brow questioningly. Remember that appendcols doesn't preserve any order between the two searches. I'd probabl... See more...
Wait a second. Whenever I see "compare" and "appendcols" in the same sentence I raise my brow questioningly. Remember that appendcols doesn't preserve any order between the two searches. I'd probably go with single search with two timeframes limited with <your search> (earliest=$main_picker.earliest$ latest=$main_picker.latest$) OR (earliest=$secondary_picker.earliest$ latest=$secondatry_picker.latest$) Then you can classify, stats and whatever you want.
@woodcock did you ever complete a more granular tagging of FireEye events?  would you be willing to share?
No. The only "variable" (runtime-determined) parts of the config are those explicitly defined as such in specs. For example - serverName parameter in [general] section of server.conf. The specs say ... See more...
No. The only "variable" (runtime-determined) parts of the config are those explicitly defined as such in specs. For example - serverName parameter in [general] section of server.conf. The specs say that it can contain environment variables so it can be dynamically set. For other parameters you define constant values.
Check this server.conf setting that you may be  missing: goes under sslOptions sslCommonNameToCheck = <commonName1>, <commonName2>, ... * If set, and 'sslVerifyServerCert' is set to "true", splun... See more...
Check this server.conf setting that you may be  missing: goes under sslOptions sslCommonNameToCheck = <commonName1>, <commonName2>, ... * If set, and 'sslVerifyServerCert' is set to "true", splunkd limits most outbound HTTPS connections to hosts which use a certificate with one of the listed common names.  
In order to be able to colour them differently, you need separate fields. Try adding this to the end of your search | transpose 0 header_field=category
I should expect not.  
Try something along these lines ^name=\"([^\"]*)\",value=(\[([^\]]+)\]|\"[^\"]+\")(.*) https://regex101.com/r/id6m8s/1
Remember that during the ingestion phase Splunk mostly processes the event as a whole - extractions (unless you have indexed fields) are done in search time. So if you wanted to encrypt part of the ... See more...
Remember that during the ingestion phase Splunk mostly processes the event as a whole - extractions (unless you have indexed fields) are done in search time. So if you wanted to encrypt part of the raw message (for now even leaving aside the question how to do it), you'd have to extract a part of the message into a field, encrypt this field, replace the original part of the raw message with the encrypted field value and finally "forget" the extracted and encrypted field values (so they do not get indexed alongside the raw event). Very, very ugly and error-prone. And we haven't even touched the question about _how_ to encrypt the value.
Yes I have seen this exactly. But is it possible to work around this in any way?
Do a quick test: [ | makeresults | eval search="| makeresults" ] If you look into the job log you'll see that while the internal search will get expanded to Expanded index search = ([ | makeresult... See more...
Do a quick test: [ | makeresults | eval search="| makeresults" ] If you look into the job log you'll see that while the internal search will get expanded to Expanded index search = ([ | makeresults | eval search="| makeresults" ]) After the subsearch is evaluated and the result is returned to the outer search it will be treated as a string, with the pipe control character escaped Expanded index search = (\| makeresults) Which means that you will be searching for literal pipe character and "makeresults" word.
Hi @rphillips_splk where can I find the doc for commands like ./splunk _internal call /services/data/inputs/monitor/_reload -auth admin:changeme Can I do a post whit it ?
I am sorry for the confusion, I updated the original question.   The idea is to dynamically create strings of eval commands in a sub search (depending on a lookup e.g.) and then applying these to t... See more...
I am sorry for the confusion, I updated the original question.   The idea is to dynamically create strings of eval commands in a sub search (depending on a lookup e.g.) and then applying these to the base search by literally putting the into the search command. I hope I could clarify this now.
Perhaps you could try changing the line breaking? Try something like this LINE_BREAKER = timestamp\":\"[^\"]+\"}}([\r\n]+)  
Hello, Thank you for your reply but it doesn't work Maybe it isn't possible to convert the JSON data that I got from DB connect  
Hi @duesser, pleae try this: index=abc [ | makeresults | addinfo | eval earliest=relative_time(info_min_time,"-60s"), latest=info_max_time |... See more...
Hi @duesser, pleae try this: index=abc [ | makeresults | addinfo | eval earliest=relative_time(info_min_time,"-60s"), latest=info_max_time | fields earliest latest ] Ciao. Giuseppe
Hi @manojchacko78, you can use fillnull to replace spaces with  "NA" | rex field=AddtionalData "Business unit:(?<BusinessUnit>[^,]+)" | rex field=AddtionalData "Location code:(?<Locationcode>[^,]+)... See more...
Hi @manojchacko78, you can use fillnull to replace spaces with  "NA" | rex field=AddtionalData "Business unit:(?<BusinessUnit>[^,]+)" | rex field=AddtionalData "Location code:(?<Locationcode>[^,]+)" | rex field=AddtionalData "Job code :(?<Jobcode>[^,]+)" | fillnull value="NA" BusinessUnit | fillnull value="NA" Locationcode | fillnull value="NA" Jobcode | stats count by BusinessUnit Locationcode Jobcode | fields - count Ciao. Giuseppe
I am extracting these three values and if there is any empty value in any of the fields, it returns as no result. How i replace the blank values with NA in the rex statements   | rex field=Addtion... See more...
I am extracting these three values and if there is any empty value in any of the fields, it returns as no result. How i replace the blank values with NA in the rex statements   | rex field=AddtionalData "Business unit:(?<BusinessUnit>[^,]+)" | rex field=AddtionalData "Location code:(?<Locationcode>[^,]+)" | rex field=AddtionalData "Job code :(?<Jobcode>[^,]+)" | stats count by  BusinessUnit Locationcode Jobcode | fields - count