All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

I need help to be able to capture variables in the MODSECURITY log. I can't create regular expressions well, is there an addon that can make it easier.
In my search results, I am getting IP and user details. I want to filter my search results if the same IP has been used by any user "*@xyz.com" in last 30 days.    
Do we have that solution in splunk
@gcusello Thank you for the quick reply on this, appreciated. 
Hi @angelo, I found this issue, but it's withour solution because the problem is in the Microsoft source: they don't want to send report data in real time or with a little delay. It isn't possible ... See more...
Hi @angelo, I found this issue, but it's withour solution because the problem is in the Microsoft source: they don't want to send report data in real time or with a little delay. It isn't possible to solve the issue also asking to Splunk PS (I did it). If you ask to Microsoft they answer: "ask to Splunk"! because Splunk is a compatitor for they cloud services. Ciao. Giuseppe
Can you also please share a couple of sanitized events so we can check the regex?
Hi @AL3Z, as I said, identify the correct regex using SPL and use that regex to blacklist events in inputs.conf. Ciao. Giuseppe
the large size logs like as below it's not a regular json data, therefore need to using rex to get fields A logs have name and uid B and C logs have uid and oid the dashboard accept input name, i... See more...
the large size logs like as below it's not a regular json data, therefore need to using rex to get fields A logs have name and uid B and C logs have uid and oid the dashboard accept input name, it allow multiple name with comma then using the name to find the uid and figure out the related uid and oid data from B logs and exclude from c logs so, I don't know how to  1. in a search statement substitute using the value of users be a keyword 2. combine the field data with comma for using  function search data in (...)    Thanks. -- for example: A logs: ... x1 ...uid=123... ... y2 ...uid=456... ... z3 ...uid=789... B logs: .... oid=989 ...uid=123 ... .... oid=566 ...uid=456 ... .... oid=486 ...uid=789 ... C logs: ...cancel_order... oid=989 ...uid=123 ... ...cancel_order... oid=566 ...uid=456 ... ...cancel_order... oid=486 ...uid=789 ... a dashboard has a input box text: users, and user can input multiple users with comma the value of users will be like "x1,z3" I wont to put the value in a search statement such us | makeresults | eval users="x1,z3" | eval names=replace(users, ",", " OR ")    =>excepted result: x1 OR z3 | search source="alog" $names$     => Substitute the names value into keyword | rex "name=(?<name>\S+)" | rex "uid=(?<uid>\d+)" | table name,uid | join type=left max=0 uid [ source="blog"  | rex "uid=(?<uid>\d+)" | rex "oid=(?<oid>\d+)" | search uid in (uids)    => uids combin the uid values with comma ex: (123,456,789) | table uid,oid ] | join type=left max=0 oid [ source="clog" cancel_order | rex "uid=(?<uid>\d+)" | rex "oid=(?<oid>\d+)" | search uid in (uids)    => uids combin the uid values with comma ex: (123,456,789) | table uid,oid,status ] | where isnull(status) | stats count(oid) by name
"The new Office 365 message trace logs have a delay throttle of 24 hours. I believe I understand the reasons behind this decision. Real-time information is important for SOC (Security Operations Cent... See more...
"The new Office 365 message trace logs have a delay throttle of 24 hours. I believe I understand the reasons behind this decision. Real-time information is important for SOC (Security Operations Center), and having a 24-hour gap in real-time data is a critical issue. One potential solution is to implement two Office 365 add-ons: one configured with the recommended settings and the other with the minimum possible delay time. Does this proposal make sense to anyone, and are there any associated risks?" Thank you for the help. 
@gcusello  How to troubleshoot changes to the inputs.conf ./etc/deployment-apps/windows_test/local/ on the deployment server not reflecting on the host C:\Program Files\SplunkUniversalForwarder\etc\... See more...
@gcusello  How to troubleshoot changes to the inputs.conf ./etc/deployment-apps/windows_test/local/ on the deployment server not reflecting on the host C:\Program Files\SplunkUniversalForwarder\etc\apps\windows_test\local\inputs.conf.
Hi @man03359 , good for you, see next time! Ciao and happy splunking Giuseppe P.S.: Karma Points are appreciated
Hi, i have created classic dashboard based on saved search because my saved search used as asset management search which contain a lot of fields. For now i need to create 3 input textbox and 1 drill... See more...
Hi, i have created classic dashboard based on saved search because my saved search used as asset management search which contain a lot of fields. For now i need to create 3 input textbox and 1 drilldown. Below are search that i used to match my token with search. | savedsearch "test 1" | search hostname=$hostname$, ip=$ip$, ID=$id$, location=$location$ However, search above doesn't work for the inputs field. Also i might need to add more inputs fields in future. Please assist me on this. Thank you 
Hi @gcusello , I was able to figure out the query which worked for me-   index="idx-network-firewall" (sourcetype="fgt_traffic" OR sourcetype="fortigate_traffic") * [| inputlookup Stores_Inventor... See more...
Hi @gcusello , I was able to figure out the query which worked for me-   index="idx-network-firewall" (sourcetype="fgt_traffic" OR sourcetype="fortigate_traffic") * [| inputlookup Stores_Inventory | search Device="stp*" | return 1601 src_ip] | stats latest(_time) values(srcname) as src latest(app) as app by src_ip | lookup Stores_Inventory src_ip OUTPUT Device | eval Device = lower(Device) | eval src=lower(src) | where isnotnull(Device) AND isnotnull(src) | rex field=src "(?i)^(?<src>.*?)(?:\..*)?$" | where src!=Device | table src_ip Device src app   Thanks for the Help, really appreciate it Ciao.  
Ahhhh... So it's not a simple in-place upgrade but rather a restore from a broken installation? (I assume it's an all-in-one instance). It should be doable but it depends on the layout of the origina... See more...
Ahhhh... So it's not a simple in-place upgrade but rather a restore from a broken installation? (I assume it's an all-in-one instance). It should be doable but it depends on the layout of the original server, on how it was installed, where the configuration was stored and so on. And it's something I'd advise you to go to your friendly local Splunk Partner for help because it's something that requires a bit of experience to do properly and damage your data.
I received the same error. On Windows, I unzipped with 7-zip, copied the file to \etc\apps, restarted Splunk. App seems to work correctly.
i need to create a  dashboard in a new tab with pie chart
Hi @AL3Z, as I said, seanch on the index where are stored the data that you filtered and on the hosts where the rule is applied: if you haven't events with the used regex, the regex is correct, oth... See more...
Hi @AL3Z, as I said, seanch on the index where are stored the data that you filtered and on the hosts where the rule is applied: if you haven't events with the used regex, the regex is correct, otherwise you have to troubleshoot it using the same search. ciao. Giuseppe
We are currently ingesting ServiceNow Logs through the Splunk Add-on for Service Now TA. However, the logs aren't being parsed properly, as they are in a raw log format, which makes it increasingly d... See more...
We are currently ingesting ServiceNow Logs through the Splunk Add-on for Service Now TA. However, the logs aren't being parsed properly, as they are in a raw log format, which makes it increasingly difficult to build any kind of dashboard etc. Does anyone have any knowledge or experience in changing ServiceNow logs from a raw format to a structured format? Any help would be greatly appreciated
This is a bit vague. Do you mean you want a table/chart to become visible when the submit button is clicked and for that table to filtered based on filter1 and filter2? What have you tried so far?
Hello Team, I have 2 input drilldown filter - filter1, filter2. Filter2 is based on the token from filter1.  When i click submit i should pass the token from filter1, filter2 to create a new dashboa... See more...
Hello Team, I have 2 input drilldown filter - filter1, filter2. Filter2 is based on the token from filter1.  When i click submit i should pass the token from filter1, filter2 to create a new dashboard.