All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

@arsidiq  Verify permissions for Splunk directories. If they've changed to root after a reboot, correct them with: chown -R splunk:splunk /opt/splunk Are you able to see the data for other indexes... See more...
@arsidiq  Verify permissions for Splunk directories. If they've changed to root after a reboot, correct them with: chown -R splunk:splunk /opt/splunk Are you able to see the data for other indexes? 
@arsidiq  Refer this  Solved: Why is no data being written to the _internal inde... - Splunk Community Solved: Why is _internal index is disabled? - Splunk Community  
@arsidiq    Verify that the search head can communicate with the indexer. If it fails, check firewall rules or network issues. Ensure the indexer is listed in the search head’s distributed sea... See more...
@arsidiq    Verify that the search head can communicate with the indexer. If it fails, check firewall rules or network issues. Ensure the indexer is listed in the search head’s distributed search configuration:   Splunk Web: Settings > Distributed Search > Search Peers. Or check $SPLUNK_HOME/etc/system/local/distsearch.conf. Check this on the indexer:-  tail -n 100 /opt/splunk/var/log/splunk/splunkd.log
yups the indexer is running, and still cant quey any data after the server has been reboot
My url is "http://127.0.0.1:8000" in log4j2 and localhost(splunk) is running on same port. Whereas the listener is 8081 port. Earlier the url was  "http://127.0.0.1:8088" in log4j2 localhost(splunk)... See more...
My url is "http://127.0.0.1:8000" in log4j2 and localhost(splunk) is running on same port. Whereas the listener is 8081 port. Earlier the url was  "http://127.0.0.1:8088" in log4j2 localhost(splunk) is running on  port 8000.Whereas the listener is 8081 port.
is anyone know how to disable this input?
@arsidiq  Ensure the indexer is running. Log into the indexer server and check Splunk's status: /opt/splunk/bin/splunk status If Splunk is not running, start it: /opt/splunk/bin/splunk start C... See more...
@arsidiq  Ensure the indexer is running. Log into the indexer server and check Splunk's status: /opt/splunk/bin/splunk status If Splunk is not running, start it: /opt/splunk/bin/splunk start Confirm that the search head and other components can communicate with the indexer. Test connectivity using: ping <indexer_ip> Verify that the Splunk management port (default: 8089) is open: telnet <indexer_ip> 8089 Check the Splunk logs on the indexer for errors: /opt/splunk/var/log/splunk/splunkd.log Look for issues related to indexing, disk space, or corrupted buckets. Common issues include: Disk full errors or Corrupted index buckets due to improper shutdown.  
Hi @PickleRick , Just an update to you. We have identified and resolved an issue related to a time discrepancy in our system, which was caused by the Oracle server's timezone configuration. The... See more...
Hi @PickleRick , Just an update to you. We have identified and resolved an issue related to a time discrepancy in our system, which was caused by the Oracle server's timezone configuration. The server was set to local time instead of UTC, resulting in a 10-hour time difference that affected [specific process, application, or data]. To address this, we have reconfigured the Oracle server to use UTC as the standard timezone, ensuring consistency and alignment with our operational requirements. This change has eliminated the time discrepancy, and all affected processes are now functioning as expected.
i installed splunk in distributed management environment. furthermore, my indexer server got reboot and i can't query my data even though at index = _internal. whereas previously it was fine.
ok so i have a drilldown so in this table there is a field solved which have default value 0 which means this particular severity is not solved . Now i want a button instead of 0 .like this ... See more...
ok so i have a drilldown so in this table there is a field solved which have default value 0 which means this particular severity is not solved . Now i want a button instead of 0 .like this now whenever a severity is being solved then when we click on this button it should change like this and this specific result  its value (solve field ) should be changed to 1. this is JS i am using but it is not working. plus ye script thi jo mai use kar raha hun   require([     'splunkjs/mvc/tableview',     'splunkjs/mvc/searchmanager',     'splunkjs/mvc',     'underscore',     'splunkjs/mvc/simplexml/ready!' ], function(     TableView,     SearchManager,     mvc,     _ ) {     var CustomLinkRenderer = TableView.BaseCellRenderer.extend({         canRender: function(cell) {             return cell.field === 'solved';         },           render: function($td, cell) {             var solved = cell.value;             var rowKey = cell.data.row.rowKey;               var icon = $('<a>')                 .attr("href", "#")                 .attr("title", "Mark as Solved")                 .css({                     "cursor": "pointer",                     "text-align": "center",                     "display": "inline-block",                     "width": "100%"                 });               icon.html('<i class="icon ' + (solved === "1" ? 'icon-check-circle' : 'icon-minus-circle') + '"></i>');               icon.on("click", function(e) {                 e.preventDefault();                   var $icon = $(this).find('i');                   // Only run update if not already solved                 if (solved === "1") {                     return; // Already marked as solved                 }                   $icon.removeClass("icon-minus-circle").addClass("icon-gear");                   var updateSearch = `                     | inputlookup sbc_major.csv                     | eval rowKey=tostring(rowKey)                     | eval match=if(rowKey="${rowKey}", "1", "0")                     | eval solved=if(match="1", "1", solved)                     | fields - match                     | outputlookup sbc_major.csv                 `;                   var updateManager = new SearchManager({                     id: "update-solved-" + _.uniqueId(),                     preview: false,                     cache: false,                     search: updateSearch                 });                   updateManager.on("search:done", function() {                     $icon.removeClass("icon-gear").addClass("icon-check-circle");                 });             });               $td.empty().append(icon);         }     });       var tableElement = mvc.Components.getInstance("sbc_alarm_table");     tableElement.getVisualization(function(tableView) {         tableView.table.addCellRenderer(new CustomLinkRenderer());         tableView.table.render();     }); });        
My url is "http://127.0.0.1:8000" in log4j2 and localhost is running on same port. Whereas the listener is 8081 port. Do all of these have to be same? Am i missing out anywhere?
Hi @daisy_st  The ITEW/ITSI comes with an internal license which is used for the itsi_* sourcetypes, this means it wont count towards any other license you have. To unlock ITEW into ITSI you do nee... See more...
Hi @daisy_st  The ITEW/ITSI comes with an internal license which is used for the itsi_* sourcetypes, this means it wont count towards any other license you have. To unlock ITEW into ITSI you do need a separate license key, however it sounds like this isnt an issue for you. Relating to the 500 error(s) - Is there anything else you can see around this?  * In the browser developer tools window, under Network, can you see the status=500 pages? Is there any response content for those api calls? * In the _internal index have a search for log_level=error "itsi"  and/or look around in the $SPLUNK_HOME/var/log/splunk/*itsi* files to see if that gives any clues - feel free to post any specific error logs here to help us diagnose.  Did this answer help you? If so, please consider: Adding karma to show it was useful Marking it as the solution if it resolved your issue Commenting if you need any clarification Your feedback encourages the volunteers in this community to continue contributing
Hi @SN1  Sorry Im not sure I fully understand - what is it you are wanting to implement with JS?
hi all, so I installed IT Essentials Work and am getting error 500. It is also displayed as ITSI under Apps and not as IT Essentials Work. Also, there are 2 licenses available for some reason. I did... See more...
hi all, so I installed IT Essentials Work and am getting error 500. It is also displayed as ITSI under Apps and not as IT Essentials Work. Also, there are 2 licenses available for some reason. I didn't add any. I don't have a license for ITSI, nor want to use ITSI. The app is installed via CLI, following Splunk's guidelines. Any suggestions what the reason could be? there is a dev license used as well so not sure if this has anything to do with the issue. Thanks!  
i want to implement it using JS is it possible?
I can confirm @dural_yyz observation. In our case as well this was not an error just weird logging telling you, connection successful but nothing to read. Try reducing frequency of your query or ig... See more...
I can confirm @dural_yyz observation. In our case as well this was not an error just weird logging telling you, connection successful but nothing to read. Try reducing frequency of your query or ignore this.
No element was found to write: java.lang.ArrayIndexOutOfBoundsException: In our case, this one really was not an error just bad logging telling you nothing to read.  It's possible that you are c... See more...
No element was found to write: java.lang.ArrayIndexOutOfBoundsException: In our case, this one really was not an error just bad logging telling you nothing to read.  It's possible that you are checking messages too frequent or there was nothing at the API endpoint the time you queried.  
Hi @therealjosh  Try something like in the below SPL example, although if you have more info and sample logs or your existing search then this would help us tailor the response further | makeres... See more...
Hi @therealjosh  Try something like in the below SPL example, although if you have more info and sample logs or your existing search then this would help us tailor the response further | makeresults count=14 | eval _time=relative_time(now(), "-" . (ceil(random()%7)) . "d") | eval source=if(random()%2==0, "A", "B") | eval value=round(random()%200) | bin _time span=1d | stats sum(value) as total by source _time | eventstats sum(total) as week_total | eval threshold=(week_total/7)*0.5 | eval color=case(total < threshold, "red", total < threshold*2, "yellow", 1=1, "green")  Did this answer help you? If so, please consider: Adding karma to show it was useful Marking it as the solution if it resolved your issue Commenting if you need any clarification Your feedback encourages the volunteers in this community to continue contributing
Hi @fhatrick  Check the following points to troubleshoot why logs are not appearing in Splunk using the HEC-based SplunkHTTP log4j logging options: Splunk HEC URL and Token Ensure the url in yo... See more...
Hi @fhatrick  Check the following points to troubleshoot why logs are not appearing in Splunk using the HEC-based SplunkHTTP log4j logging options: Splunk HEC URL and Token Ensure the url in your config points to your Splunk HTTP Event Collector (HEC) endpoint, not localhost unless Splunk is running on the same host as MuleSoft. Example: url="https://<splunk-server>:8088" The token value must match exactly the HEC token configured in Splunk. HEC Configuration in Splunk Confirm that HEC is enabled in Splunk (Settings > Data Inputs > HTTP Event Collector). The token is enabled and assigned to the correct index (indexname). Index Existence and Permissions Verify the index (indexname) exists in Splunk and your user has permission to search it. Network Connectivity Ensure the MuleSoft server can reach the Splunk HEC endpoint (no firewall or network issues) - use something like netcat to check this (nc -vz -w1 yourServer 8088) Testing HEC Directly Test HEC by sending a sample event using: curl -k https://<splunk-server>:8088/services/collector/event \ -H "Authorization: Splunk <token>" \ -d '{"event":"test event", "index":"indexname"}' If this event appears in Splunk, the HEC and index are working. Did this answer help you? If so, please consider: Adding karma to show it was useful Marking it as the solution if it resolved your issue Commenting if you need any clarification Your feedback encourages the volunteers in this community to continue contributing
Good day Everyone,  Currently trying to instrument Oracle Forms and Reports for some of the critical applications that are used within my enterprise, The way I'm configuring it is as follows:  ... See more...
Good day Everyone,  Currently trying to instrument Oracle Forms and Reports for some of the critical applications that are used within my enterprise, The way I'm configuring it is as follows:  1. Launch the WebLogic Server 2. Enter the Managed Server (1 for Forms and 1 for Reports) 3. Add -javaagent arguments to the "arguments" section for each of the managed servers and restart the managed servers themself.  What this gives me:  1. I am able to see Forms and Reports discovered as separate tiers within AppDynamics, showing Servelet calls.  2. I am able to see the RCU database which is required for the Weblogic startup that contains Metadata.  What I am missing and trying to achieve:  1. I am missing the connection to the actual transactional database that works with this application. 2. Once the above point is complete, to use data collectors for transaction snapshots to output the User ID and help co-relate exactly which Forms are working slowly or having errors so that this can be resolved by the Application team.  If the community has any information on custom instrumentation that can be done to achieve the two points mentioned above, that would be extremely helpful, insights from previous tries to instrument Oracle Forms and Reports are also welcome and highly appreciated.  Also please feel free to let me know if monitoring the Admin Server itself via Startup Script might be the way forward, to resolve the issues mentioned above, as well as any information or guidance towards monitoring via the OPMN file that was mentioned in another forum which I've been reading on, if anybody has the experience. All AppDynamics Discussions posts - Link to the forum mentioning OPMN.xml file configuration. Thank you for taking the time to read and sharing your thoughts! JVM Instrumentation Agent