All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

My indexer server is 2016 and splunk 7 is installed there , but somehow OS got crashed , so we have to re-install the OS and after that we will re-install the splunk 7 instance there, and the old Dat... See more...
My indexer server is 2016 and splunk 7 is installed there , but somehow OS got crashed , so we have to re-install the OS and after that we will re-install the splunk 7 instance there, and the old Data is present in F Drive as it was configured as such. so my question is that if i re-install the splunk 7 there and configure it as old version, will the data get reflected in splunk instance?
1. Splunk 7 is and has been unsupported for quite some time already so if anything goes wrong you might have problems getting help. This upgrade is several years overdue. 2. See the https://docs.spl... See more...
1. Splunk 7 is and has been unsupported for quite some time already so if anything goes wrong you might have problems getting help. This upgrade is several years overdue. 2. See the https://docs.splunk.com/Documentation/Splunk/9.1.1/Installation/HowtoupgradeSplunk document for requirements for specific versions (you can change the version of the document in the top right corner). You can upgrade to 9.x from 8.2 or any lower 9.x. So your first "stop" needs to be 8.2. If you see the document version for a 8.2 release, you see that you firstly have to upgrade to 8.0 or 8.1 So your upgrade path should be 7.x -> 8.0.x or 8.1.x -> 8.2.x -> 9.x
My server has windows version 2016 and it has splunk 7 , now i want to upgrade it to splunk 9 and 2019 version. what should be the flow to upgrade , so that i dont loose any old splunk 7 Data?
Dear all, i'm trying to intergate Wso2-api manager but i cannot see any BT status agent status is up, i follow this link: https://medium.com/@raj10x/monitor-wso2-products-using-appdynamics... See more...
Dear all, i'm trying to intergate Wso2-api manager but i cannot see any BT status agent status is up, i follow this link: https://medium.com/@raj10x/monitor-wso2-products-using-appdynamics-8faf72e83a7  for custom pojo but it didn't work. anyone succcess for this platform?
Hello richgalloway, thank you for your answer. I did the extraction in props.conf and transforms.conf. However, I cannot find or access the extracted field in the Splunk interface. Here's what I wr... See more...
Hello richgalloway, thank you for your answer. I did the extraction in props.conf and transforms.conf. However, I cannot find or access the extracted field in the Splunk interface. Here's what I wrote in transforms.conf: [extract_host] REGEX = ^(?:[^ \n]* ){9}\w+\d+\s+(?P<newhostname>\w+) FORMAT = newhostname::$1 The following in props.conf [sourcetype::Datacollection] TRANSFORMS-extract_host = extract_host Did I do something wrong here? Thanks for your answer in advance. Sharon
Hi @tscroggins, Thank you very much for sharing the detailed inputs and also for also sharing the alternate approaches for exploring. Thank you
I would like to build  splunk attack range and perform series of attack on my splunk server using AWS. Do I need to create image of my server to do that? Is that even possible? How I can test my exis... See more...
I would like to build  splunk attack range and perform series of attack on my splunk server using AWS. Do I need to create image of my server to do that? Is that even possible? How I can test my existing infrastructure using this tool, instead of creating splunk server that is created with the tool automatically? I've already have read this docs: https://attack-range.readthedocs.io/en/latest/Attack_Range_AWS.html https://github.com/splunk/attack_range https://www.splunk.com/en_us/blog/security/attack-range-v3-0.html
Nope not working
@gcusello , Error in 'SearchOperator:regex': The regex '(?:ParentProcessName).+(?:C:\Program Files\Windows Defender Advanced Threat Protection\)' is invalid. Regex: unknown property after \P or \p... See more...
@gcusello , Error in 'SearchOperator:regex': The regex '(?:ParentProcessName).+(?:C:\Program Files\Windows Defender Advanced Threat Protection\)' is invalid. Regex: unknown property after \P or \p.    
Hi @Lavender , in this case, you have to add an additional condition: index=xyz component=gateway appid=12345 message="*|osv|*" | rex "trace-id.(?<RequestID>\d+)" | search RequestID=* | eval env=ma... See more...
Hi @Lavender , in this case, you have to add an additional condition: index=xyz component=gateway appid=12345 message="*|osv|*" | rex "trace-id.(?<RequestID>\d+)" | search RequestID=* | eval env=main_search | table _time Country Environment appID LogMessage env | append [search index=xyz appid=12345 message="*|osv|*" level="error" `mymacrocompo` | rex "trace-id.(?<RequestID>\d+)" | search RequestID=* | eval env=sub_search | table RequestID LogMessage1 env ] | stats earliest(_time) AS _time values(Country) AS Country values(Environment) AS Environment values(appID) AS appID values(LogMessage) AS LogMessage values(eval(if(level="error",LogMessage1, "NULL"))) AS Errorlogs dc(env) AS env_count BY RequestID | where env_count=2 Ciao. Giuseppe
Hi @AL3Z , run a search on the index where are stored the logs you filtered and, if your filter is applied on one or more hosts, eventually adding a filter on hosts. In the search use the same rege... See more...
Hi @AL3Z , run a search on the index where are stored the logs you filtered and, if your filter is applied on one or more hosts, eventually adding a filter on hosts. In the search use the same regex using the regex command (https://docs.splunk.com/Documentation/Splunk/9.1.1/SearchReference/Regex). Something like this: index=windows host=<your_host> | regex "(?:ParentProcessName).+(?:C:\\Program Files\\Windows Defender Advanced Threat Protection\\)" Check the results and see if they arrive from the hosts you're waiting or not. Ciao. Giuseppe 
Owh ok, both working great as expected. Thank you for your assist on this.
Hi, I had blacklisted the "(?:ParentProcessName).+(?:C:\\Program Files\\Windows Defender Advanced Threat Protection\\)" in deployment server and applied it to  one of the windows server how we can t... See more...
Hi, I had blacklisted the "(?:ParentProcessName).+(?:C:\\Program Files\\Windows Defender Advanced Threat Protection\\)" in deployment server and applied it to  one of the windows server how we can trouble shoot whether it is applied or not ?  
@mad_splunker  index=someindex cluster=api uuid=api_uuid [ search index=someindex cluster=gw uuid=gw98037234c6e51a48816016172b8a3c56 | eval uuid="gw"+reqid | table uuid ]   Can you please try thi... See more...
@mad_splunker  index=someindex cluster=api uuid=api_uuid [ search index=someindex cluster=gw uuid=gw98037234c6e51a48816016172b8a3c56 | eval uuid="gw"+reqid | table uuid ]   Can you please try this? I have used different approach.    thanks KV
Hello Splunkers, I am trying below query -   index=someindex cluster=gw uuid=gw98037234c6e51a48816016172b8a3c56 | eval api_uuid="gw"+reqid | head 1 | append [search index=someindex cluster=api uui... See more...
Hello Splunkers, I am trying below query -   index=someindex cluster=gw uuid=gw98037234c6e51a48816016172b8a3c56 | eval api_uuid="gw"+reqid | head 1 | append [search index=someindex cluster=api uuid=api_uuid]   Basically what I am trying is to get result from first search, evaluate new field from first search and add it as condition to second search. It is not working if I supply api_uuid field but If I replace uuid in append with actual computed value it is returning proper result. I have seen few people using join but dont want to use join as its expensive and comes with limit. Any solution to above query ?
In results, we are getting Error Log message if available but our requirement is to get the log message only if Request ID is matching with RequestID of Sub Query. please help
If you want both fields you can either use rex to get both fields or split to split the string on the : character and then assign the first split to ip and the second to host. | rex field=Hostname "... See more...
If you want both fields you can either use rex to get both fields or split to split the string on the : character and then assign the first split to ip and the second to host. | rex field=Hostname "(?<ip>[^:]*):(?<host>.*)" OR | eval tmp=split(Hostname, ":") | eval ip=mvindex(tmp, 0), host=mvindex(tmp, 1) | fields - tmp rex is neater and you can make this an automatically extracted field, so you don't have to do it as part of the search.
Hi @bowesmana , thank you for your response. Your regex works great. if i want the ip on another field, do i need to use another regex?
Hi @gcusello ,   Thanks for your answers. 
Use rex | rex field=Hostname ".*:(?<host>.*)"  which will give you a new field called host with everything from the : to the end