All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Hi All We are trying to get the incidents which are in open state (ie AlertStatus only equal to CREATE) . Table Out is below : Here IncidentID 1414821 has both AlertStatus = CLEAR and CREA... See more...
Hi All We are trying to get the incidents which are in open state (ie AlertStatus only equal to CREATE) . Table Out is below : Here IncidentID 1414821 has both AlertStatus = CLEAR and CREATE , this Incident ID should not get displayed . We need IncidentID only with Alertstaus = CREATE. we ran with | eval IncidentID=case(AlertStatus="CREATE" AND AlertStatus!="CLEAR",IncidentID) | table IncidentID AlertStatus  When we run an Query it should only Display IncidentID value 1437718   Thanks and Regards      
Hi All, Created test user and assign the viwer roles and provided read only access, the above screen not the test user not able to see the under the knowledge objects, how yo remove the knowledge obj... See more...
Hi All, Created test user and assign the viwer roles and provided read only access, the above screen not the test user not able to see the under the knowledge objects, how yo remove the knowledge objects? Please help me the process? I need to remove tags,eventypes,lookups,userinterface..................  
OK, for the clarification. In my case (I have no idea if yours is the same but seems so). The RSTs were not sent as a response to the initial SYN - signalling a closed port. No, they were sent by the... See more...
OK, for the clarification. In my case (I have no idea if yours is the same but seems so). The RSTs were not sent as a response to the initial SYN - signalling a closed port. No, they were sent by the receiving end some time after the connection had been already established and some data was already sent through it. Just for no apparent reason the receiver decided that it wouldn't talk to the sender no more and would abruptly close the connection.
Hi,  the outputs.conf is the same as in our linux hosts (which are working fine). anyway i shall check with my network team on the firewall level.  and also raise a support case. thanks for the inp... See more...
Hi,  the outputs.conf is the same as in our linux hosts (which are working fine). anyway i shall check with my network team on the firewall level.  and also raise a support case. thanks for the inputs.  Cheers
@vijreddy30 - There is no concept of "Read access" in Splunk. In Splunk terms, you have to assign role which consist of capabilities.   This document describes all the capabilities - https://docs.s... See more...
@vijreddy30 - There is no concept of "Read access" in Splunk. In Splunk terms, you have to assign role which consist of capabilities.   This document describes all the capabilities - https://docs.splunk.com/Documentation/Splunk/9.1.1/Security/Rolesandcapabilities    BTW, I don't think you can create a role/user that has only read access based on available capabilities. But you try updating capabilities to that role to see if any combination capabilities. See if any combination works for you.   I hope this helps!!!
I am trying to setup the drop down value from one dashboard to another dashboard. On the first dashboard I setup the interactions to set the token value. Do I need to setup anything on the second das... See more...
I am trying to setup the drop down value from one dashboard to another dashboard. On the first dashboard I setup the interactions to set the token value. Do I need to setup anything on the second dashboard?
Hello! I'm working on setting up the integration between Splunk SOAR and Splunk using the Splunk App for SOAR Export. I was able to configure my SOAR server in the app and verify connectivity, but I... See more...
Hello! I'm working on setting up the integration between Splunk SOAR and Splunk using the Splunk App for SOAR Export. I was able to configure my SOAR server in the app and verify connectivity, but I'm running into errors when trying to use the alert action associated with the app. When using the "Send to SOAR" alert action, I receive "Alert script returned error code 5" in the logs. I wasn't able to find any information regarding this error code so I'm not sure what could be causing it. Any help would be appreciated, thank you!
If you have a support entitlement, you can submit a ticket with Splunk Support.
Onboarding of data is completely under your control even in Splunk Cloud.  To send the data to an events index, change the index name in inputs.conf to one that is for events. Note that there are tw... See more...
Onboarding of data is completely under your control even in Splunk Cloud.  To send the data to an events index, change the index name in inputs.conf to one that is for events. Note that there are two types of indexes: event indexes and metrics indexes.  Events indexes are the traditional type and can hold any text data.  Metrics indexes are relatively new and are designed to hold metrics data in a specific format for faster processing.  A metrics index cannot store events nor can it store data that is not properly formatted. Changing the format of the data depends on the source of that data.  You may have to work with the data engineer to get the data formatted such that it can be stored in a metrics index.
BIG-IP uses syslog-ng so the easiest approach would probably be to reconfigure it to send events to a remote destination. Then receive and ingest as you'd do with any other syslog source (with rsyslo... See more...
BIG-IP uses syslog-ng so the easiest approach would probably be to reconfigure it to send events to a remote destination. Then receive and ingest as you'd do with any other syslog source (with rsyslog/plain syslog-ng/SC4S... I wouldn't advise using built-in network port input) See for example https://my.f5.com/manage/s/article/K13080
Hey Community, We have 2 BIG-IP load balancer VMs and need to have the OS logs (like audit.d) forwarded to Splunk. So, this is not about the F5 application logs themselves, but the OS logs from the ... See more...
Hey Community, We have 2 BIG-IP load balancer VMs and need to have the OS logs (like audit.d) forwarded to Splunk. So, this is not about the F5 application logs themselves, but the OS logs from the underlying system. Is there a way to do this? Much appreciate your support.
@richgalloway  I'm working on Splunk cloud how we can correct the event format or send the data to an events index ?
Hi @richgalloway, At the moment, a few days later, 3 out of 4 CloudFront IPs are still serving an expired certificate. Leaving aside for the moment that I feel it's a bad look for a security platfo... See more...
Hi @richgalloway, At the moment, a few days later, 3 out of 4 CloudFront IPs are still serving an expired certificate. Leaving aside for the moment that I feel it's a bad look for a security platform to let its TLS certificate expire, whom can I contact about this without resorting to speaking to a sales person? There seems to be no tech support page on splunk.com that doesn't link to sales. Kind regards, Toon
I have time series data like this: _time digital_value: can be either 0.1 or 1 (see Note) analog_value: can be 0, 100, 500, 1000, 5000, 10000 Note) It's actually 0 or 1, but 0 doesn't show in a... See more...
I have time series data like this: _time digital_value: can be either 0.1 or 1 (see Note) analog_value: can be 0, 100, 500, 1000, 5000, 10000 Note) It's actually 0 or 1, but 0 doesn't show in a bar graph.   I want to plot this data in a diagram like this: X axis = _time digital_value=0.1 as a red bar digital_value=1 as a green bar analog_value as an overlaid line graph, with log scale Y axis To colorize digital_value, I understand I must split it into two series, like this:   | digital_value_red = if(digital_value=0.1, 0.1, null()) | digital_value_green = if(digital_value=1, 1, null()) | fields -digital_value   However, this creates two bars per data point, where only the non-null one is shown and the other one leaves a gap. That way, I don't have equally spaced bars along the X axis any more. See this example:       So, stacked bars? Yes, but that doesn't work with log scale Y axis for the overlaid line graph. So, calculate log(analog_value)  and plot that a linear Y axis? While that produces a proper visual, you can't read the value of analog_value any more (only it's log).   Any ideas how I can achieve a colorized bar graph + log scale overlay?
The error message seems plain enough.  There is data going into a metrics index that is not formatted properly for that index type.  Either correct the event format or send the data to an events index.
You can add the token name and value to the url you define in your drilldown for the charts, then use this token in the dashboard. When you use tokens, you will notice that the URL address in your b... See more...
You can add the token name and value to the url you define in your drilldown for the charts, then use this token in the dashboard. When you use tokens, you will notice that the URL address in your browser will change to include any tokens which have been defined - you can use this as a guide to the format you need for your drilldown URL
Hi @ITWhisperer , Here it seems that transpose was not the good approach. Your solution is working as expected. Many thanks, Emile
Hi Splunkers,    I'm having a drodown for index_value with console, standard and aws as options, also having separate pie charts for standard, console and aws, when we click the pie chart in any one... See more...
Hi Splunkers,    I'm having a drodown for index_value with console, standard and aws as options, also having separate pie charts for standard, console and aws, when we click the pie chart in any one of these 3, it will take to another dashboard, over there i need to mark the value of index_valrue of drilldown as standard if we select the standard pie chart in the drilldown of new dashboard that is same for all other two selections. Thanks in Advance, Manoj Kumar S
@Arty yes but it depends how you want to send.  E.g. The SSH App does have the ability to send files. I suspect there are other apps that can too but you would need to check the actions list on sp... See more...
@Arty yes but it depends how you want to send.  E.g. The SSH App does have the ability to send files. I suspect there are other apps that can too but you would need to check the actions list on splunkbase, or if you have access to a SOAR platform you can type the action name in the top-left search field, such as "put file" and then select `apps` and it will show you apps with the action.   I saw SSH/HTTP/Windows when i checked so there should be plenty of options.   
Try to get error failures from live integration and create Splunk alert for every continuous 5 Alerts