All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Hi all, today I updated Splunk enterprise from 9.0.5 to 9.1.1. Since the update I see the folliwing messages on the start page: "Laden der App-Liste nicht möglich. Aktualisieren Sie die Seite, um... See more...
Hi all, today I updated Splunk enterprise from 9.0.5 to 9.1.1. Since the update I see the folliwing messages on the start page: "Laden der App-Liste nicht möglich. Aktualisieren Sie die Seite, um den Vorgang zu wiederholen." and "Laden von gemeinsamen Aufgaben nicht möglich. Aktualisieren Sie die Seite, um den Vorgang zu wiederholen." Reloading the page doesn't solve the issue. A reboot of Windows where Splunk is installed doesn't help either. Splunk seems to work fine. But do you have any ideas how to solve the issue? Thank You.
Please share you search so we can offer suggestions to optimize it. VPC data can be huge so it will take time to process 6 months of it.  You should consider using a data model.  How much data is th... See more...
Please share you search so we can offer suggestions to optimize it. VPC data can be huge so it will take time to process 6 months of it.  You should consider using a data model.  How much data is the search going through?  Is the data evenly distributed among the indexers?
Assuming by "volume" you mean the number of occurrences, try this index=foo "ERROR" host=bar earliest=-7d | stats count
I want to get the volume for a specific word "ERROR" occurrence in a specific server in last 7 days. How to do that? Please help.
Splunk shows duplicate events in search results when there are no duplicates in the source file.
I have a a saved search for vpcflow logs sourcetype which searches for particular CIDR (src_ip & dest_ip) but takes almost 3 4 hrs run the query when it searches for last 6months , I want the output ... See more...
I have a a saved search for vpcflow logs sourcetype which searches for particular CIDR (src_ip & dest_ip) but takes almost 3 4 hrs run the query when it searches for last 6months , I want the output for external reporting , what is the best method forward to save time & resources . we dont have data models on our search head.
Your suggestion worked. Thank you so much | dbxquery connection=visibility query="select \"abc:def\" from tableCompany"
We are using Splunk OPC Add-On to bring in some tags. We have two specific tags that we are currently looking at. Tag 1's value will always be "Productive" or "Non-productive". Tag 2's value will be ... See more...
We are using Splunk OPC Add-On to bring in some tags. We have two specific tags that we are currently looking at. Tag 1's value will always be "Productive" or "Non-productive". Tag 2's value will be a current string value or blank.  We are hoping that we can alert if Tag1 = Productive & Tag2 != "", then we can return a result and alert off of this result.  I have tried: "Tag1"="Productive" AND NOT isnull("Tag2") but that doesn't return any results when there should be a few results. I'm not sure if I need to combine these somehow?
There are two ways to exclude events containing certain words.  The first is to put the word(s) in the base search ( the part before the first |) preceded by "NOT".  It may be easier to put desired w... See more...
There are two ways to exclude events containing certain words.  The first is to put the word(s) in the base search ( the part before the first |) preceded by "NOT".  It may be easier to put desired words here if that number is smaller.  This won't work if the work must be in a specific field this not yet extracted. index="600000304_d_gridgain_idx*" sourcetype =$Regions$ source="/amex/app/gfp-settlement-raw/logs/gfp-settlement-raw.log" "StatisticBalancer - statisticData: StatisticData" "TRIM.UNB.D082923.T045920" |rex "totalOutputRecords=(?<totalOutputRecords>),busDt=(?<busDt>),fileName=(?<fileName>),totalAchCurrOutstBalAmt=(?<totalAchCurrOutstBalAmt>),totalAchBalLastStmtAmt=(?<totalAchBalLastStmtAmt>),totalClosingBal=(?<totalClosingBal>),totalRecordsWritten=(?<totalRecordsWritten>),totalRecords=(?<totalRecords>)" |table busDt fileName totalAchCurrOutstBalAmt totalAchBalLastStmtAmt totalClosingBal totalRecordsWritten totalRecords The other way is to use the search or where command to filter out events with the offending words (or keep those with desired words). index="600000304_d_gridgain_idx*" sourcetype =$Regions$ source="/amex/app/gfp-settlement-raw/logs/gfp-settlement-raw.log" "StatisticBalancer - statisticData: StatisticData" |rex "totalOutputRecords=(?<totalOutputRecords>),busDt=(?<busDt>),fileName=(?<fileName>),totalAchCurrOutstBalAmt=(?<totalAchCurrOutstBalAmt>),totalAchBalLastStmtAmt=(?<totalAchBalLastStmtAmt>),totalClosingBal=(?<totalClosingBal>),totalRecordsWritten=(?<totalRecordsWritten>),totalRecords=(?<totalRecords>)" | where fileName="TRIM.UNB.D082923.T045920" |table busDt fileName totalAchCurrOutstBalAmt totalAchBalLastStmtAmt totalClosingBal totalRecordsWritten totalRecords  
Hi you could search a reason for deleting bucket from internal index. You can start with  index=_internal *cold* *<your index or bucket Id>* You will get list of buckets. Select one which are fro... See more...
Hi you could search a reason for deleting bucket from internal index. You can start with  index=_internal *cold* *<your index or bucket Id>* You will get list of buckets. Select one which are frozen. Then use that bucket id to see the process how and why it has frozen. r. Ismo
Hi @obpedro  Thank you for your response. However, we are using preserve lookup while executing the apply bundle command.  So, in that case will change in deployer_lookups_push_mode help fix it? Is ... See more...
Hi @obpedro  Thank you for your response. However, we are using preserve lookup while executing the apply bundle command.  So, in that case will change in deployer_lookups_push_mode help fix it? Is it not same as using -preserve-lookup true in the apply bundle command? Also want to know what value you have for deployer_lookups_push_mode?
The indexAndForward setting must be in the [tcpout] stanza. Please elaborate on "it didn't work".
There are few ways to limit the number of results.  The head, dedup, and stats commands can be used.  Which to use depends on the inputs and the desired results. index="abc" sourcetype =600000304_gg... See more...
There are few ways to limit the number of results.  The head, dedup, and stats commands can be used.  Which to use depends on the inputs and the desired results. index="abc" sourcetype =600000304_gg_abs_ipc2 source="/amex/app/gfp-settlement-raw/logs/gfp-settlement-raw.log" "ReadFileImpl - ebnc event balanced successfully" | head 1 | eval True=if(searchmatch("ebnc event balanced successfully"),"✔","") | eval EBNCMessage="ebnc event balanced successfully" | table EBNCMessage True index="abc" sourcetype =600000304_gg_abs_ipc2 source="/amex/app/gfp-settlement-raw/logs/gfp-settlement-raw.log" "ReadFileImpl - ebnc event balanced successfully" | eval True=if(searchmatch("ebnc event balanced successfully"),"✔","") | eval EBNCMessage="ebnc event balanced successfully" | dedup EBNCMessage | table EBNCMessage True index="abc" sourcetype =600000304_gg_abs_ipc2 source="/amex/app/gfp-settlement-raw/logs/gfp-settlement-raw.log" "ReadFileImpl - ebnc event balanced successfully" | eval True=if(searchmatch("ebnc event balanced successfully"),"✔","") | eval EBNCMessage="ebnc event balanced successfully" | stats values(*) as * by EBNCMessage | table EBNCMessage True  
Hello Everyone, Regrettably, the oldest available data across all indexes has been reduced to approximately 7 months. I have already conducted the following checks: Current index size: Less than 2... See more...
Hello Everyone, Regrettably, the oldest available data across all indexes has been reduced to approximately 7 months. I have already conducted the following checks: Current index size: Less than 200GB (configured for 500GB) Indexers Disk Size (Cluster): All indexes currently have 30-35% free space. frozenTimePeriodInSecs=39420043 (approximately 15 months) Any assistance with troubleshooting would be greatly appreciated. Thank you.    
Hi @GaetanVP , I'm Vatsal from the Community Moderator team. As I can see you answered your own question. In such scenario if you accept your own answer it will be very useful for future visitors he... See more...
Hi @GaetanVP , I'm Vatsal from the Community Moderator team. As I can see you answered your own question. In such scenario if you accept your own answer it will be very useful for future visitors here.   Happy Splunking!!!
@PetrK - Yes, try this search and view them as timechart on Visualization tab. index="some_index" sourcetype="zabbix:history" hostname="WMS_NAME1" description="mem Heap Memory used" OR description="... See more...
@PetrK - Yes, try this search and view them as timechart on Visualization tab. index="some_index" sourcetype="zabbix:history" hostname="WMS_NAME1" description="mem Heap Memory used" OR description="mem Heap Memory max"| spath "groups{}" | search "groups{}"="Instances/Tests*" | eval ValueMB=value/1024/1024 | eval memUsed=if(description="mem Heap Memory used", valueMB, null()) | eval memMax=if(description="mem Heap Memory max", valueMB, null()) | timechart avg(memUsed) as avg_memUsed, max(memMax) as max_memMax   I hope this helps!!! Kindly upvote if it does!!!
Hi Team, I have below row logs: 2023-08-30 07:43:28.671 [INFO ] [Thread-18] ReadFileImpl - ebnc event balanced successfully My current query: index="abc" sourcetype =600000304_gg_abs_ipc2 source=... See more...
Hi Team, I have below row logs: 2023-08-30 07:43:28.671 [INFO ] [Thread-18] ReadFileImpl - ebnc event balanced successfully My current query: index="abc" sourcetype =600000304_gg_abs_ipc2 source="/amex/app/gfp-settlement-raw/logs/gfp-settlement-raw.log" "ReadFileImpl - ebnc event balanced successfully" | eval True=if(searchmatch("ebnc event balanced successfully"),"✔","") | eval EBNCMessage="ebnc event balanced successfully" | table EBNCMessage True This occurs as many time as file got processed I want to show only 1 event ebnc event balanced successfully                         true But its coming 8 times as 8 files go
@fredclown - Email is just an alert action that comes default with Splunk. As you mentioned currently there is no option to prepend in the subject. You could raise as improvement in Splunk at https... See more...
@fredclown - Email is just an alert action that comes default with Splunk. As you mentioned currently there is no option to prepend in the subject. You could raise as improvement in Splunk at https://ideas.splunk.com/ Or you could have your own custom Splunk alert action for email with all the same options, but there of course you could specify whatever subject you want in your own Python code. But somehow you would have to disable Splunk's built in Email action, so people don't use that to bypass your rule.   I hope this helps!!! Kindly upvote if it does!!
Hi Team, I have below row logs: 2023-08-30 07:43:29.000 [INFO ] [Thread-18] StatisticBalancer - statisticData: StatisticData [selectedDataSet=13283520, rejectedDataSet=0, totalOutputRecords=2067040... See more...
Hi Team, I have below row logs: 2023-08-30 07:43:29.000 [INFO ] [Thread-18] StatisticBalancer - statisticData: StatisticData [selectedDataSet=13283520, rejectedDataSet=0, totalOutputRecords=20670402, totalInputRecords=0, fileSequenceNum=9226, fileHeaderBusDt=08/29/2023, busDt=08/29/2023, fileName=TRIM.UNB.D082923.T045920]   2023-08-30 05:36:30.678 [INFO ] [Thread-19] StatisticBalancer - statisticData: StatisticData [selectedDataSet=27, rejectedDataSet=0, totalOutputRecords=27, totalInputRecords=0, fileSequenceNum=6395, fileHeaderBusDt=08/29/2023, busDt=08/29/2023, fileName=TRIM.CNX.D082923.T052656] I want to fetch records only for highlighted file  not for other files but I am getting for both the files. My current query: index="600000304_d_gridgain_idx*" sourcetype =$Regions$ source="/amex/app/gfp-settlement-raw/logs/gfp-settlement-raw.log" "StatisticBalancer - statisticData: StatisticData" |rex "totalOutputRecords=(?<totalOutputRecords>),busDt=(?<busDt>),fileName=(?<fileName>),totalAchCurrOutstBalAmt=(?<totalAchCurrOutstBalAmt>),totalAchBalLastStmtAmt=(?<totalAchBalLastStmtAmt>),totalClosingBal=(?<totalClosingBal>),totalRecordsWritten=(?<totalRecordsWritten>),totalRecords=(?<totalRecords>)" |table busDt fileName totalAchCurrOutstBalAmt totalAchBalLastStmtAmt totalClosingBal totalRecordsWritten totalRecords  
Does anyone have a creative solution or know if there is an obscure way in Splunk to prepend a certain string to the beginning of email subjects that are sent from Splunk? I'm looking for something t... See more...
Does anyone have a creative solution or know if there is an obscure way in Splunk to prepend a certain string to the beginning of email subjects that are sent from Splunk? I'm looking for something that users could not override when they create an alert or report. I do know about the email footer option in the email setup screen to add a static footer that cannot be altered by users and we do employ that as well. I'm trying to do something like this with the email subject. Thanks.