@richgalloway I have read somewhere that it will be implicit OR. May be in documentation can't remember. But is it good practice to have summary data into original index? What are the consequences I...
See more...
@richgalloway I have read somewhere that it will be implicit OR. May be in documentation can't remember. But is it good practice to have summary data into original index? What are the consequences I face in long term? Sourcetype is stash I see for summary data. Not able to change this.
Hi @AliMaher I colleague of mine recently took the SPLK-3001 exam and was based on ES 7.x. For self-study, I'd recommend using the official Splunk Enterprise Security Certified Admin Exam Blueprin...
See more...
Hi @AliMaher I colleague of mine recently took the SPLK-3001 exam and was based on ES 7.x. For self-study, I'd recommend using the official Splunk Enterprise Security Certified Admin Exam Blueprint which lists all tested topics and recommended learning paths - this will help focus on which areas are covered in the exam and allow you to tick off what you've learnt. Did this answer help you? If so, please consider: Adding karma to show it was useful Marking it as the solution if it resolved your issue Commenting if you need any clarification Your feedback encourages the volunteers in this community to continue contributing
Thanks for the response. I actually installed both Java 21 and 24 but no luck. JRE path as C:\Program Files (x86)\Common Files\Oracle\Java\java8path\java.exe Upon putting above path and click o...
See more...
Thanks for the response. I actually installed both Java 21 and 24 but no luck. JRE path as C:\Program Files (x86)\Common Files\Oracle\Java\java8path\java.exe Upon putting above path and click on save. Upon returning to the same page, the path is gone. Error remains there, FileNotFoundError: [WinError 2] The system cannot find the file specified validate java command: java.
Here is more about selecting correct user in windows environment https://help.splunk.com/en/splunk-enterprise/get-started/install-and-upgrade/9.4/install-splunk-enterprise-on-windows/choose-the-windo...
See more...
Here is more about selecting correct user in windows environment https://help.splunk.com/en/splunk-enterprise/get-started/install-and-upgrade/9.4/install-splunk-enterprise-on-windows/choose-the-windows-user-splunk-enterprise-should-run-as
When you have cluster, then correct method is add nodes to it and after data has spread into those new nodes, then remove old nodes. Here is details how to do it https://community.splunk.com/t5/Splun...
See more...
When you have cluster, then correct method is add nodes to it and after data has spread into those new nodes, then remove old nodes. Here is details how to do it https://community.splunk.com/t5/Splunk-Enterprise/Migration-of-Splunk-to-different-server-same-platform-Linux-but/m-p/538062
The example questions in the Study Guide are about ES7 (the most obvious differentiator between those two is notables vs. findings). It is a normal practice for Splunk certifications and trainings to...
See more...
The example questions in the Study Guide are about ES7 (the most obvious differentiator between those two is notables vs. findings). It is a normal practice for Splunk certifications and trainings to not rely on the most bleeding edge versions of software since there are often older versions in use in the real world.
This is a relatively old thread and I don't recall seeing any of its participants active lately. Anyway, I don't think you can disable the rest command as such. You can limit the scope of informatio...
See more...
This is a relatively old thread and I don't recall seeing any of its participants active lately. Anyway, I don't think you can disable the rest command as such. You can limit the scope of information the user can access (see the list_* capabilities) but I don't think you can prohibit a user from listing indexes on an AIO instalation.
Hello Splunker, I hope you all are doing well. I prepare to take the SPLK-3001 Exam, and I want to know the Self-Study guide, and the Version of the ES? is it V7 or V8? Thanks in advance!
I would check the job inspector (and job log) for the details of the exact search being spawned. Doesn't your users' role have some limits set for search time ranges? And does it also "work" the same...
See more...
I would check the job inspector (and job log) for the details of the exact search being spawned. Doesn't your users' role have some limits set for search time ranges? And does it also "work" the same way when you chose longer time range from the time picker?
You "have tried" to install JRE or did you install it? The manual explicitly lists Java 17 and 21. It doesn't list 24 so it might work but is not officially supported. And on Windows I'd defintiely...
See more...
You "have tried" to install JRE or did you install it? The manual explicitly lists Java 17 and 21. It doesn't list 24 so it might work but is not officially supported. And on Windows I'd defintiely go for Option 3: Set JRE installation directory in Configuration > Settings > JRE Installation Path. https://help.splunk.com/en/splunk-cloud-platform/connect-relational-databases/deploy-and-use-splunk-db-connect/4.0/before-you-deploy/system-requirements
It seems to be a commercial app with a possible 90-day trial available on request. The vendore chose not to provide any form of pricing publicly. You must contact them directly to obtain any informa...
See more...
It seems to be a commercial app with a possible 90-day trial available on request. The vendore chose not to provide any form of pricing publicly. You must contact them directly to obtain any information about the product.
Windows server 2022 I have tried installing JRE24 and Java 8. It doesn't let me save the JAVA_HOME path. Throw below error:- FileNotFoundError: [WinError 2] The system cannot find the file specif...
See more...
Windows server 2022 I have tried installing JRE24 and Java 8. It doesn't let me save the JAVA_HOME path. Throw below error:- FileNotFoundError: [WinError 2] The system cannot find the file specified validate java command: java. Any help would be appreciated!!!!
Avoid search filters. While they can be useful at times, more often they complicate matters. For instance, in your case the members of 6-8 AD groups (therefore, presumably, in 6-8 Splunk roles) wil...
See more...
Avoid search filters. While they can be useful at times, more often they complicate matters. For instance, in your case the members of 6-8 AD groups (therefore, presumably, in 6-8 Splunk roles) will have 6-8 search filters combined with implicit AND operators to create a search that finds nothing. The only reliable way to control access to data is to put that data in an index with the proper RBAC settings. Rather than have a single summary index, it would be better to create a separate summary index for each group of users with unique access requirements.
The :: notation is for indexed fields. If a field is defined as indexed field, the k=v part in the search will get translated to a condition using k::v form in the underlying index search phase. Whi...
See more...
The :: notation is for indexed fields. If a field is defined as indexed field, the k=v part in the search will get translated to a condition using k::v form in the underlying index search phase. While index is not an indexed field as such both forms should work with it as well. To get a bit more technical - indexed fields are written as single key::value tokens in the lexicon so you can look for them by those tokens.
Ten seconds is far too often to refresh a dashboard. Unless you have an automaton monitoring the dashboard and taking action on what it finds, 5 minutes is more reasonable. It sounds like the das...
See more...
Ten seconds is far too often to refresh a dashboard. Unless you have an automaton monitoring the dashboard and taking action on what it finds, 5 minutes is more reasonable. It sounds like the dashboard is occasionally encountering periods when there are too many other searches running so it has to wait for resources. There is little a dashboard can do about that (other than not contributing to the problem by refreshing too frequently). If multiple users are accessing the dashboard at the same time, consider replacing in-line searches with scheduled searches that are invoked by the dashboard using the loadjob or savedsearch command. That will replace multiple executions of the same query with a single execution and each user will have the same view of the data.
We will create two indexes per application one for non_prod and one for prod logs in same splunk. They create 2 AD groups (np and prod). We will create indexes, roles and assign that to respective AD...
See more...
We will create two indexes per application one for non_prod and one for prod logs in same splunk. They create 2 AD groups (np and prod). We will create indexes, roles and assign that to respective AD groups. Till here it is good. Now we created a single summary index for all prod indexes data and we need to give access to that index to all app teams. Being single summary index, thought of filtering it at role level using srchFilter and service field, so that to restrict one user seeing other apps summary data Below is the role created for non-prod [role_abc]
srchIndexesAllowed = non_prod
srchIndexesDefault = non_prod Below is the role created for prod [role_xyz]
srchIndexesAllowed = prod;opco_summary
srchIndexesDefault = prod
srchFilter = (index::prod OR (index::opco_summary service::juniper-prod)) Not sure whether to use = or :: here to work? Because in UI when I m testing it is giving warning when I give = .. but when giving :: search preview results not working. Not sure what to give? Here my doubt is when the user with these two roles if they can search only index=non_prod if he see results or not? How this search works in backend? Is there any way to test? And few users are part of 6-8 AD groups (6-8 indexes). How this srchFilter work here? Please clarify
Hi @ITWhisperer , I have tried this method. The host name on the log is structured like "hostname.abcgroup.com". I want to search like, "hostname*". Since, the hostnames are retrieved from lookup...
See more...
Hi @ITWhisperer , I have tried this method. The host name on the log is structured like "hostname.abcgroup.com". I want to search like, "hostname*". Since, the hostnames are retrieved from lookup it's working as a static string search. Not filtering the host. I tried like this after get the data from lookup, | eval host_pattern=host."*" | table host_pattern But, this is also not working. I guess the Splunk may consider the wildcard * as string. Since, I am filtering like this. Any suggestion for this...