All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

hi i have some process data in the source=ps  want to get status if down. i have observed it can be done using PID. for example one command ./cybAgent.bin  which is running with some PID and after... See more...
hi i have some process data in the source=ps  want to get status if down. i have observed it can be done using PID. for example one command ./cybAgent.bin  which is running with some PID and after stopped it and started it PID will change and new PID is showing in the splunk data but how we can determine when its stopped below are the events before and after restarted 10/20/23 12:07:31.000 PM root    6043    0.7    1.2    6769248    201544    ?    Ssl    Oct06    158:59    ./cybAgent.bin    -a host = testhost 10/20/23 12:07:02.000 PM root    6043    0.7    1.2    6769248    201544    ?    Ssl    Oct06    158:59    ./cybAgent.bin    -a host = testhost           10/20/23 3:50:30.000 PM root 20414 1.0 1.1 6766164 189864 ? Ssl 01:41 2:12 ./cybAgent.bin -a host = testhost 10/20/23 3:50:03.000 PM root 20414 0.9 1.1 6766164 189864 ? Ssl 01:41 2:11 ./cybAgent.bin -a host = testhost
for my mail logs in JSON format, with my splunk query I created below table mail from mail sub mail to ABC account created for A abc@a.com ABC account created for B bcd@a.com ABC ... See more...
for my mail logs in JSON format, with my splunk query I created below table mail from mail sub mail to ABC account created for A abc@a.com ABC account created for B bcd@a.com ABC account created for C efg@a.com   In my splunk query I apply dedup on "mail sub".  as you can see unique but very similar subject remains in table which I want to further become joined or considered as 1 row. my ask: what are the possible  way that I can partially match table column values and they combined into 1 .? in matching logic if somehow we can use two columns for matching (mail from and mail sub)   mail from mail sub mail to count ABC account created for A abc@a.com 3   count 3 is coming on the basis of partial match in unique subject and mail from combined.  
Hi @DANITO115, did you followed the Splunk Search Tutorial (https://docs.splunk.com/Documentation/SplunkCloud/latest/SearchTutorial/WelcometotheSearchTutorial)? Anyway, this depends on the data typ... See more...
Hi @DANITO115, did you followed the Splunk Search Tutorial (https://docs.splunk.com/Documentation/SplunkCloud/latest/SearchTutorial/WelcometotheSearchTutorial)? Anyway, this depends on the data type you want to search and if you already extracted the status field. If you already extracted, you could simply use: index=your_index status=403 if not, you have to extract it using a regex, but to help you in this a sample of your logs is required. Otherwise, you can simply search the string 403 index=your_index 403 but you could have some false positive: Ciao. Giuseppe
Good morning, I need to know what the exact search command is in order to see this parameter: Enter a search that returns all web application events that contain a prohibited status (403)
Thanks for providing the hints. I tried both the changes eval and random command it did not work unfortunately. While I am sure the data exists.
Hello everyone, we use LDAPS in Splunk to allow our employees to log in to the system (Search Heads). Is there a way for users to change their passwords when needed or after they have expired? Some u... See more...
Hello everyone, we use LDAPS in Splunk to allow our employees to log in to the system (Search Heads). Is there a way for users to change their passwords when needed or after they have expired? Some users only access Splunk and do not have any other means to update their passwords.
| appendpipe [| stats min(_time) as _time | eval event="min"]
Hi at all, I have to configure a multisite Indexer Cluster and I have a dubt: in the Splunk architectig course, the indicated Indexer Cluster replication port was 9100. Then reading Multisite Inde... See more...
Hi at all, I have to configure a multisite Indexer Cluster and I have a dubt: in the Splunk architectig course, the indicated Indexer Cluster replication port was 9100. Then reading Multisite Indexer Cluster documentation the indicated port is 9887. What's the correct one? Can I use 9100 instead 9887 or 9100 is dedicated to other purposes? Thank you for your support. Ciao. Giuseppe
@Ragamonster you will need to use REST to find the task you want to add the note to and then POST the note to that task. https://docs.splunk.com/Documentation/SOARonprem/6.1.1/PlatformAPI/RESTNote... See more...
@Ragamonster you will need to use REST to find the task you want to add the note to and then POST the note to that task. https://docs.splunk.com/Documentation/SOARonprem/6.1.1/PlatformAPI/RESTNotes  Specifically look at the below: You can do this using the HTTP app but I prefer using the sessions API as it's pre-authenticated and gives you a lot more control: https://docs.splunk.com/Documentation/SOARonprem/6.1.1/PlaybookAPI/SessionAPI  -- Hope this helps. If so please mark as a solution for future readers. Happy SOARing! --
Hi, I am having this same issue at the moment as the domain i manage is completely airgapped form the internet so no cloud connectivity. After some digging i found have read there are events in the ... See more...
Hi, I am having this same issue at the moment as the domain i manage is completely airgapped form the internet so no cloud connectivity. After some digging i found have read there are events in the event viewer. Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational 1116 - MALWAREPROTECTION_STATE_MALWARE_DETECTED 1117 - MALWAREPROTECTION_STATE_MALWARE_ACTION_TAKEN 1118 - MALWAREPROTECTION_STATE_MALWARE_ACTION_FAILED 1119 - MALWAREPROTECTION_STATE_MALWARE_ACTION_CRITICALLY_FAILED I haven't tested them yet as i have literally just found them online this minute and came across this message board at the same time.  I hope this helps and if you have found anything extra can you put them in here too. Im going set up the forwarder now to collect these and create a dashboard  KR Richard 
Try something like this on the original (unedited) field | rex field=MSADChangedAttributes max_match=0 "(?m)(?<Changed>^[^-]*$)"
If anybody still facing this issues and could not figured out the solution. In my case, I had to change view type.  You can see here there are three options to choose Raw, List, Table. If you w... See more...
If anybody still facing this issues and could not figured out the solution. In my case, I had to change view type.  You can see here there are three options to choose Raw, List, Table. If you want to set JSON syntax highlight by default, you should choose List view.  
Hello ttovarzoll, Thank you for providing your solutions. Unfortunately it doesn't work in all cases as showed in the following screenshots where the 'User Account Control' is filled. I can image th... See more...
Hello ttovarzoll, Thank you for providing your solutions. Unfortunately it doesn't work in all cases as showed in the following screenshots where the 'User Account Control' is filled. I can image that this is also the case for other fields. Did you came across this issue and do you perhaps have an solution for this?     Kind regards, Jos
The only way volunteers can help you concretely is for you to post sample or mock data (anonymize as needed) in text, illustrate desired results (in text), then explain the logic between illustrated ... See more...
The only way volunteers can help you concretely is for you to post sample or mock data (anonymize as needed) in text, illustrate desired results (in text), then explain the logic between illustrated data and results.  Forget Splunk.  What would you be looking for in the data you illustrate to determine status by PID?  What does "status of process based on PID" even mean? Do you mean listing status of process grouped by PID? (Splunk and many data query languages call this group-by.)
Have you looked up Create a CSV lookup definition?  You can define a field as match type CIDR.  The question is extremely vague.  If you want concrete help, illustrate mock data, desired results, and... See more...
Have you looked up Create a CSV lookup definition?  You can define a field as match type CIDR.  The question is extremely vague.  If you want concrete help, illustrate mock data, desired results, and explain the logic between data and desired results.
Hi @Praz_123, what's your question? This message says that you haven't enough disk space on the partition where you have indexed (by default $SPLUNK_HOME/var/lib/splunk) so indexing was stopped. T... See more...
Hi @Praz_123, what's your question? This message says that you haven't enough disk space on the partition where you have indexed (by default $SPLUNK_HOME/var/lib/splunk) so indexing was stopped. To solve this issue you have to free space (e.g. deleting splunk logs from $SPLUNK_HOME/var/log/splunk) or (better) adding more disk space to your file system. Ciao. Giuseppe
Very smart! Thanks!
ID: rb.splunk-es.abc.com:/dev/mapper/vg_data-lv_data_opt:os_high_disk_utilization - rb.splunk-es.abc.com - High Priority - Low disk space on /data/opt at 2.00% free
I came across of running a custom python script in Splunk on the triggered events by adding the run a script action but I don't know how to do it. As the alerts are visible on Splunk I want to run a ... See more...
I came across of running a custom python script in Splunk on the triggered events by adding the run a script action but I don't know how to do it. As the alerts are visible on Splunk I want to run a script and extract those triggered alerts by running a script.
You cannot use wildcard group in eval.  Use foreach to iterate. | foreach test-*.traffics [eval <<FIELD>> = round('<<FIELD>>' / 1024, 2)]