All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

If the file doesn't change then Splunk won't re-index it.  You'll have to delete the fishbucket to force Splunk to re-index the file. splunk cmd btprobe -d /opt/splunkforwarder/var/lib/splunk/fishbu... See more...
If the file doesn't change then Splunk won't re-index it.  You'll have to delete the fishbucket to force Splunk to re-index the file. splunk cmd btprobe -d /opt/splunkforwarder/var/lib/splunk/fishbucket/splunk_private_db --file <small file> --reset
can't figure out how to indexing my data from zigbee2mgtt.  The logs are exported from Home assistance via syslog, as Json.  I have tried various settings in props on the forwarder. Current sett... See more...
can't figure out how to indexing my data from zigbee2mgtt.  The logs are exported from Home assistance via syslog, as Json.  I have tried various settings in props on the forwarder. Current setting: [zigbee2mqtt] DATETIME_CONFIG = INDEXED_EXTRACTIONS = JSON category = structured NO_BINARY_CHECK = true TIMESTAMP_FIELDS = timestamp LINE_BREAKER = ([\r\n]+) disabled = false pulldown_type = true And on the search: Current: [zigbee2mqtt] KV_MODE = JSON And this is how the data appears in the log.  for me it looks like some kind mix, not just JSON data. Sep 20 19:13:19 linsrv 1 2023-09-20T17:13:19.941+02:00 localhost Zigbee2MQTT - - - MQTT publish: topic 'zigbee2mqtt/P001', payload '{"auto_off":null,"button_lock":null,"consumer_connected":true,"consumption":7.82,"current":0,"device_temperature":25,"energy":7.82,"led_disabled_night":null,"linkquality":255,"overload_protection":null,"power":0,"power_outage_count":3,"power_outage_memory":null,"state":"OFF","update":{"installed_version":41,"latest_version":32,"state":"idle"},"update_available":false,"voltage":234}'/n host = linsrv index = zigbee source = /disk1/syslog/in/linsrv/2023-09-20/messages.log sourcetype = zigbee2mqtt   Sep 20 19:08:13 linsrv06.hemdata.hemdata.se 1 2023-09-20T17:08:13.988+02:00 localhost Zigbee2MQTT - - - MQTT publish: topic 'zigbee2mqtt/P002', payload '{"auto_off":null,"button_lock":null,"consumer_connected":true,"consumption":2.58,"current":0,"device_temperature":23,"energy":2.58,"led_disabled_night":null,"linkquality":255,"overload_protection":null,"power":0,"power_outage_count":0,"power_outage_memory":null,"state":"OFF","update":{"installed_version":41,"latest_version":32,"state":"idle"},"update_available":false,"voltage":229}'/n host = linsrv index = zigbee source = /disk1/syslog/in/linsrv/2023-09-20/messages.log sourcetype = zigbee2mqtt   Sep 20 19:08:13 linsrv 1 2023-09-20T17:08:13.968+02:00 localhost Zigbee2MQTT - - - MQTT publish: topic 'zigbee2mqtt/P001', payload '{"auto_off":null,"button_lock":null,"consumer_connected":true,"consumption":7.82,"current":0,"device_temperature":25,"energy":7.82,"led_disabled_night":null,"linkquality":255,"overload_protection":null,"power":0,"power_outage_count":3,"power_outage_memory":null,"state":"OFF","update":{"installed_version":41,"latest_version":32,"state":"idle"},"update_available":false,"voltage":234}'/n host = linsrv index = zigbee source = /disk1/syslog/in/linsrv/2023-09-20/messages.logsourcetype = zigbee2mqtt   Sep 20 19:08:06 linsrv 1 2023-09-20T17:08:06.199+02:00 localhost Zigbee2MQTT - - - MQTT publish: topic 'zigbee2mqtt/P002', payload '{"auto_off":null,"button_lock":null,"consumer_connected":true,"consumption":2.58,"current":0,"device_temperature":23,"energy":2.58,"led_disabled_night":null,"linkquality":255,"overload_protection":null,"power":0,"power_outage_count":0,"power_outage_memory":null,"state":"OFF","update":{"installed_version":41,"latest_version":32,"state":"idle"},"update_available":false,"voltage":229}'/n host = linsrv index = zigbee source = /disk1/syslog/in/linsrv/2023-09-20/messages.log sourcetype = zigbee2mqtt  
Thanks ITWHisperer , Much Appreciated !
I tried your string in the datapreview screen.  I placed it in the timestamp format field.  I used \d{8}\:\d{6}\.\d{3} as the prefix put I'm still getting timestamp=none
Hello @gcusello, We are currently working on a script to verify the existence of various tools, including Tanium, Forescout, Akamai, and Splunk Forwarder, on all the machines.
Hi @aleccese -- Looks like this question has gained a lot of interest, but it is originally from 2021. Could you please post this issue as a new question to gain more visibility?   Thanks! -Kar... See more...
Hi @aleccese -- Looks like this question has gained a lot of interest, but it is originally from 2021. Could you please post this issue as a new question to gain more visibility?   Thanks! -Kara Splunk Community Manager
Greetings, I have a search that list every index and what sourcetypes are contained within it. |tstats values(sourcetype) where index=* by index What I like about it is that I can see each ind... See more...
Greetings, I have a search that list every index and what sourcetypes are contained within it. |tstats values(sourcetype) where index=* by index What I like about it is that I can see each index and a list of all of the sourcetypes specific tot that index. I'm trying to see this same data format by with a column of the indexes and a column of all of the fields that index contains. I'm working on adding indexes to an app that already list what fields it needs but doesn't know what index they are associated to. So I have something like hash value fields md5 and MD5. They are different because of the source they come from but I need to find the index they live to add it. I also think it would just be useful for audit purposes so if expected fields can be confirmed at a glance. Please let me know if you have any questions. Thank you! Best, Brian
Hi @dc17! Kara here, Splunk Community Manager. Thanks for following up on this question from 2020, but I recommend posting it as a brand new question so that it can get more visibility. Cheers!
Assuming that represents 18 July 23 00:15:41.421 then the format string would be %Y%m%d:%H%M%S.%3N
I'm looking to use the following as my timestamp.  What should I use in props as my timestamp format and timestamp prefix. [20230718:001541.421] : [WARN ]
Hello All, Im having an issue where my license has stopped showing that any data is getting ingested. The data is still coming in and everything looks to be good,  but the license is showing that n... See more...
Hello All, Im having an issue where my license has stopped showing that any data is getting ingested. The data is still coming in and everything looks to be good,  but the license is showing that no data is getting ingested but it is. Does anyone have a solution or ever ran into this problem?    
I have the following search that works but I'm trying to display more information in the search results.  I have a watchlist lookup.  I use that to search notable events so that I can alert on a us... See more...
I have the following search that works but I'm trying to display more information in the search results.  I have a watchlist lookup.  I use that to search notable events so that I can alert on a user or asset that is part of a new notable.    I'm trying to figure out how to display the new notable in the results.    | inputlookup user_watchlist | search _key=* | rename _key as user | table user asset | dedup user asset | eval flag="no" | join type=left user asset [ search index=notable | where isnotnull(src) | table src user _time | mvexpand src | mvexpand user | dedup src user | eval user=mvindex(split(user,"@"),0) | eval flag="yes" | rename src as asset | eval asset=lower(asset)] | where flag="yes"    
So my first SPL, it gets me the URLs I'm looking for but doesn't list the URLs (in the lookup) that don't get any results. The parenthesis "(in the lookup)" is key here.  My first reading of "... See more...
So my first SPL, it gets me the URLs I'm looking for but doesn't list the URLs (in the lookup) that don't get any results. The parenthesis "(in the lookup)" is key here.  My first reading of "only counting the matches, i need the URLs that don't exist to count 0" took it to mean URLs in the index that didn't have a match.  This new description makes perfect sense.  And your search is more efficient. index="web_index" [| inputlookup URLs.csv | fields kurl | rename kurl as url] | stats count by url | append [inputlookup URLs.csv | fields kurl | rename kurl AS url] | stats sum(count) as count by url | fillnull count ``` or you can omit this and leave nonexistent to show null ```​ Alternatively, you can do index="web_index" [| inputlookup URLs.csv | fields kurl | rename kurl as url] | append [inputlookup URLs.csv | fields kurl | rename kurl AS url] | eval match = if(isnull(match), 0, 1) | stats sum(match) as count by url  
Hi @gcusello    I am using "Splunk Add-on for Check Point Log Exporter" from https://splunkbase.splunk.com/app/5478. I installed this on splunk SH and  did rename sourcetype on Splunk HF to "cp_lo... See more...
Hi @gcusello    I am using "Splunk Add-on for Check Point Log Exporter" from https://splunkbase.splunk.com/app/5478. I installed this on splunk SH and  did rename sourcetype on Splunk HF to "cp_log:syslog" as per the add-on. 
wow, amazing...this is the result I want Respect!  Thanks a lot.
| eval DcActionValue=if(DcActionValue=0,"Successful","Failure")
Hello Splunkers, I need some help with writing a SPL, I have a field  called "DcPolicyAction" where the value could be 0 or 1, if its 0 I want to basically call it Successful and If its 1 it is Fai... See more...
Hello Splunkers, I need some help with writing a SPL, I have a field  called "DcPolicyAction" where the value could be 0 or 1, if its 0 I want to basically call it Successful and If its 1 it is Failure , can someone help me with the SPL syntax.  I dont want to use the stats command. Just a simple query that lists the field.   Thank you,   regards, Moh.
Try something like this index="*" host="... | join type=left max=0 uid [search [| makeresults | addinfo | eval earliest=relative_time(info_min_time, "-7d@d") | eval latest=info_min_time | table ear... See more...
Try something like this index="*" host="... | join type=left max=0 uid [search [| makeresults | addinfo | eval earliest=relative_time(info_min_time, "-7d@d") | eval latest=info_min_time | table earliest latest ] index="*" host="... ]
Hi @willsy ,  I know this is an old topic but did you find any solution for this ?  I have to send data in XML to a third party and maintain the data flow to Splunk indexers.  It is possible to s... See more...
Hi @willsy ,  I know this is an old topic but did you find any solution for this ?  I have to send data in XML to a third party and maintain the data flow to Splunk indexers.  It is possible to separate the "renderXML=true" command and "renderXML=false" in some way? Thank you, 
this issue was worked around by rewriting the query