All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Hi @av_ ! There's a tool some of us use to provide a gut-check, crontab guru (not affiliated in any way with it - just a user),  which I used on the cron you provided: https://crontab.guru/#*/5_21-... See more...
Hi @av_ ! There's a tool some of us use to provide a gut-check, crontab guru (not affiliated in any way with it - just a user),  which I used on the cron you provided: https://crontab.guru/#*/5_21-23,0-13_*_*_0-5 The tool's assessment, is the cron runs on Sundays. If we breakdown the cron, the last part (0-5) sets the days of the week. So it we try changing that to 1-5, it appears it may work for you. */5 21-23,0-13 * * 1-5 There are other tools out there. There's nothing magical about what I used, but I like it for people who are unfamiliar with cron. Good luck! If this helped you, please provide it a thumbs up.
Hi @Dustem, you schedule your search every day (using the last day as time frame) and you save the results in a summary index, one event every day. Then you can schedule a search on the summary ind... See more...
Hi @Dustem, you schedule your search every day (using the last day as time frame) and you save the results in a summary index, one event every day. Then you can schedule a search on the summary index, using three days as time frame. Ciao. Giuseppe
Hi gcusello, How do I set it to trigger at the same time in three days?
Please provide the field extraction itself, as defined in props.conf or transforms.conf.
Hi @AL3Z, for forwarders, you should have a list of all the UFs to monitor in a lookup calleg e.g. perimeter.csv, containing at least one field (host). Then you can run a search like the following:... See more...
Hi @AL3Z, for forwarders, you should have a list of all the UFs to monitor in a lookup calleg e.g. perimeter.csv, containing at least one field (host). Then you can run a search like the following: | tstats count WHERE index=_internal BY host | eval host=lower(host) | append [ | inputlookup perimeter.csv | eval host=lower(host), count=0 | fields host count ] | stats sum(count) AS total BY host | where total=0 in this way you have the list of UFs not sending logs. If you want a table with all hosts with their status, you could run something like this: | tstats count WHERE index=_internal BY host | eval host=lower(host) | append [ | inputlookup perimeter.csv | eval host=lower(host), count=0 | fields host count ] | stats sum(count) AS total BY host | eval status=if(total=0,"Missing","Present) Ciao. Giuseppe
Thank you very much, replaced where with search and that worked like a charm
Hi @merc14, probably you're meaning that you could have events without the productType, obviously these events aren't matched by the All (*) value. You could modify the input adding an additiona st... See more...
Hi @merc14, probably you're meaning that you could have events without the productType, obviously these events aren't matched by the All (*) value. You could modify the input adding an additiona static value to search the events without productType. If you could share the input code, I can be more detailed. Ciao. Giuseppe
For UF,  Can you pls provide with the search to find all the host  contains Forwarder !
You can't remove code from SPL based on input.  Nor does SPL allow for conditional execution.  The solution is to set the "All" value of $dropdown$ to a value that is valid for all productType values... See more...
You can't remove code from SPL based on input.  Nor does SPL allow for conditional execution.  The solution is to set the "All" value of $dropdown$ to a value that is valid for all productType values.  Often, this is "*".  It may be necessary to change where to search.
I have a search query that takes a search value from a drop down.  Example Drop down has values All A B Query uses  | where productType="$dropdown$" How do I remove the where clause if All is... See more...
I have a search query that takes a search value from a drop down.  Example Drop down has values All A B Query uses  | where productType="$dropdown$" How do I remove the where clause if All is selected. There is no productType - All
Hi Team,  I am trying to install the Machine Agent on a Unix Machine hosted in AWS .  Installation is fine, i can see the Appd Machine Agent service up and running. But it is not getting registered ... See more...
Hi Team,  I am trying to install the Machine Agent on a Unix Machine hosted in AWS .  Installation is fine, i can see the Appd Machine Agent service up and running. But it is not getting registered to the controller .  When i check the logs, it shows up a Timed out error.  Is there anything specific i need to do for AWS Ec2 instances that has machine agents installed there 
Oh wow, I really hadn't thought of that at all. I started the extraction via here and followed the steps shown:   ...    
Hi @AL3Z, can you run a script to check the process? Ciao. Giuseppe
For SE,  Its not possible to access the interface or check if the Splunk process is active for all other machines from my machine.
Change the time range of the search to start in July 2023.  That may be within the lift_activity_marco_1d macro.
Please share how the extracted_hostname field is extracted (with more detail than "via the GUI").  It sounds like the extraction makes an assumption that applies only with two-digit dates.
My splunk instance is running in GMT and I want to schedule an alert as per China time.  */5 21-23,0-13 * * 0-5 This is the cron. The logic is to trigger the alert every 5minutes from Monday to frid... See more...
My splunk instance is running in GMT and I want to schedule an alert as per China time.  */5 21-23,0-13 * * 0-5 This is the cron. The logic is to trigger the alert every 5minutes from Monday to friday 5AM till 10 PM china Time but the alert is getting triggered on Sunday as well. How can we cutomise the cron?  
Hi @AL3Z, are youskeaking of Splunk Enterprise or Splunk Universal Forwarder? if SE, you can try to access the interface or check if the Splunk process is active. if UF, you can see in Splunk if y... See more...
Hi @AL3Z, are youskeaking of Splunk Enterprise or Splunk Universal Forwarder? if SE, you can try to access the interface or check if the Splunk process is active. if UF, you can see in Splunk if you have internal logs (index=_internal host=<your_host>), or check if the Splunk process is active. Ciao. Giuseppe
Hi, I am attempting to determine if Splunk is installed on all of our local systems within our environment. Is there a way to check this through Tags, the Windows Registry (regedit), or ParentProce... See more...
Hi, I am attempting to determine if Splunk is installed on all of our local systems within our environment. Is there a way to check this through Tags, the Windows Registry (regedit), or ParentProcessname or a PowerShell script? If so, could you please provide guidance on the process? Thanks
Hi @Dustem, you could save the results of you search in a summary index (using the collect command), then execute the alert on the summary index and trigger it if you have more than 3 results. Ciao... See more...
Hi @Dustem, you could save the results of you search in a summary index (using the collect command), then execute the alert on the summary index and trigger it if you have more than 3 results. Ciao. Giuseppe