All Posts

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Posts

Hi @danielbb, As an alternative in Simple XML, you can stack visualizations vertically by including more than one visualization in a panel:   <row> <!-- first row --> <panel> </panel> </row>... See more...
Hi @danielbb, As an alternative in Simple XML, you can stack visualizations vertically by including more than one visualization in a panel:   <row> <!-- first row --> <panel> </panel> </row> <row> <panel> <!-- second row, first column --> </panel> <panel> <chart> <!-- second row, second column, first row --> </chart> <chart> <!-- second row, second column, second row --> </chart> <chart> <!-- second row, second column, third row --> </chart> </panel </row>   Some visualizations may require an empty spacer, e.g. an <html/> section, to defeat the auto-layout code. Here's an extended example using an inverse normal macro (not shown) to generate a bit of random data:   <dashboard version="1.1" theme="light"> <label>danielbb_layout</label> <search id="base"> <query>| gentimes start=11/29/2024:00:00:00 end=11/30/2024:00:00:00 increment=1m | eval _time=starttime | fields + _time | sort 0 - _time | eval x=`norminv("`rand()`*(0.9999999999999999-0.0000000000000001)+0.0000000000000001", 1.3, 10)`</query> </search> <search id="stats" base="base"> <query>| stats avg(x) as u stdev(x) as s</query> </search> <row> <panel> <html> <h1>Some Random Data</h1> </html> </panel> </row> <row> <panel> <chart> <title>Histogram</title> <search base="base"> <query>| chart count over x span=0.5</query> </search> <option name="charting.legend.placement">none</option> <option name="height">600</option> </chart> </panel> <panel> <chart> <title>Samples</title> <search base="base"></search> <option name="charting.legend.placement">none</option> </chart> <single> <title>Mean</title> <search base="stats"> <query>| fields u</query> </search> <option name="numberPrecision">0.000</option> </single> <html/> <single> <title>Standard Deviation</title> <search base="stats"> <query>| fields s</query> </search> <option name="numberPrecision">0.000</option> </single> </panel> </row> </dashboard>  
I suppose it's another attempt at reducing the size of the logs while maintaining the events as such but cutting the unnecessary parts from them.
In addition to what @PickleRick wrote, what problem are you trying to solve?  Splunk is quite capable of parsing XML logs so why are trying to re-format them?  Why not use a transform to extract the ... See more...
In addition to what @PickleRick wrote, what problem are you trying to solve?  Splunk is quite capable of parsing XML logs so why are trying to re-format them?  Why not use a transform to extract the fields directly instead of the interim SEDCMD step?
We don't know the whole picture but from the partial info I can guest that - assuming the regex and the substitution pattern are OK, there are two obvious things which might be wrong. 1) You put you... See more...
We don't know the whole picture but from the partial info I can guest that - assuming the regex and the substitution pattern are OK, there are two obvious things which might be wrong. 1) You put your settings on a wrong Splunk component (i.e. you're trying to put them on the indexer when your data is going through a HF earlier) and/or 2) You're binding the SEDCMD in a wrong stanza. I see that you're using XmlWinEventLog: Security - this is the long gone naming convention and it hasn't been in use for several years now. Now all windows events are of sourcetype XmlWinEventLog and the source field differentiates between the originating event log. As a side note - it's a good practice to avoid writing to system/local - use apps to group your settings so that you can later easily manage them, overwrite, inherit and so on.
Hi @kmahanta_17  1.  First you need to be certified power user  2. for exam preparation        following courses are recommended but not mandatory         Splunk System Administration       ... See more...
Hi @kmahanta_17  1.  First you need to be certified power user  2. for exam preparation        following courses are recommended but not mandatory         Splunk System Administration         Splunk Data Administration          you can refer to documentation for above courses if you are not able to attend courses  https://www.splunk.com/en_us/pdfs/training/splunk-enterprise-certified-admin-track.pdf  Blue Print for exam  https://www.splunk.com/en_us/pdfs/training/splunk-test-blueprint-enterprise-admin.pdf 
Hi Folks, Can anyone suggest or help me out on how to get prep for Splunk administration certification course and which certification is good in that case? Regards, Kanchan
Hi community, The following mod=sed regex works as expected, but when I attempted on the system/local/props.conf on the indexers it fails to trim as tested via | make results | makeresults | eva... See more...
Hi community, The following mod=sed regex works as expected, but when I attempted on the system/local/props.conf on the indexers it fails to trim as tested via | make results | makeresults | eval _raw="<Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider Name='Microsoft-Windows-Security-Auditing' Guid='{54849625-5478-4994-a5ba-3e3bxxxxxx}'/><EventID>4627</EventID><Version>0</Version><Level>0</Level><Task>12554</Task><Opcode>0</Opcode><Keywords>0x8020000000000000</Keywords><TimeCreated SystemTime='2024-11-27T11:27:45.6695363Z'/><EventRecordID>2177113</EventRecordID><Correlation ActivityID='{01491b93-40a4-0002-6926-4901a440db01}'/><Execution ProcessID='1196' ThreadID='1312'/><Channel>Security</Channel><Computer>Computer1</Computer><Security/></System><EventData><Data Name='SubjectUserSid'>S-1-5-18</Data><Data Name='SubjectUserName'>CXXXXXX</Data><Data Name='SubjectDomainName'>CXXXXXXXX</Data><Data Name='SubjectLogonId'>0x3e7</Data><Data Name='TargetUserSid'>S-1-5-18</Data><Data Name='TargetUserName'>SYSTEM</Data><Data Name='TargetDomainName'>NT AUTHORITY</Data><Data Name='TargetLogonId'>0x3e7</Data><Data Name='LogonType'>5</Data><Data Name='EventIdx'>1</Data><Data Name='EventCountTotal'>1</Data><Data Name='GroupMembership'> %{S-1-5-32-544} %{S-1-1-0} %{S-1-5-11} %{S-1-16-16384}</Data></EventData></Event>" | rex mode=sed "s/(?s).*<Event[^>]*>.*?<EventID>4627<\/EventID>.*?<TimeCreated SystemTime='([^']*)'.*?<Computer>([^<]*)<\/Computer>.*?<Data Name='SubjectUserName'>([^<]*)<\/Data>.*?<Data Name='SubjectDomainName'>([^<]*)<\/Data>.*?<Data Name='TargetUserName'>([^<]*)<\/Data>.*?<Data Name='TargetDomainName'>([^<]*)<\/Data>.*?<Data Name='LogonType'>([^<]*)<\/Data>.*?<\/Event>.*/EventID:4627 TimeCreated:\\1 Computer:\\2 SubjectUserName:\\3 SubjectDomainName:\\4 TargetUserName:\\5 TargetDomainName:\\6 LogonType:\\7/g" ---------------------------------- [XmlWinEventLog: Security] SEDCMD-reduce_4627 = s/(?s).*<Event[^>]*>.*?<EventID>4627<\/EventID>.*?<TimeCreated SystemTime='([^']*)'.*?<Computer>([^<]*)<\/Computer>.*?<Data Name='SubjectUserName'>([^<]*)<\/Data>.*?<Data Name='SubjectDomainName'>([^<]*)<\/Data>.*?<Data Name='TargetUserName'>([^<]*)<\/Data>.*?<Data Name='TargetDomainName'>([^<]*)<\/Data>.*?<Data Name='LogonType'>([^<]*)<\/Data>.*?<\/Event>.*/EventID:4627 TimeCreated:\1 Computer:\2 SubjectUserName:\3 SubjectDomainName:\4 TargetUserName:\5 TargetDomainName:\6 LogonType:\7/g Can anyone help me identify where the problem is, please? Thank you.
Hi @danielbb , as also @richgalloway said, there are more parameters that you have to consider: data volume, HA or not HA, number of users and scheduled searches, etc... My first hint is to engage... See more...
Hi @danielbb , as also @richgalloway said, there are more parameters that you have to consider: data volume, HA or not HA, number of users and scheduled searches, etc... My first hint is to engage a Splunk Certified Architect or a Splunk Professional Services to design your architecture. You could find some ideas at https://www.splunk.com/en_us/pdfs/tech-brief/splunk-validated-architectures.pdf E.g.: having only one Indexer, there's no requirements for a Cluster Manager and you can put the License manager on the same Indexer; the Cluster manager is required if you have HA requirements and you have at least two Indexers. About the HF, it depends on many factors: where are located your Meraki servers, on premise or in Cloud? if on-premise it's a best practice to have a concentrator between devices and Indexers, anyway, you could also put (it isn't a best practice) the syslog receiver on the Indexers. Then how Meraki sends logs? if by syslog, you should configure an rsyslog server or SC4S on a dedicated server. As I said, I hint to engare a Splunk Certified Architect. Ciao. Giuseppe
Hi @inessa40408 , Splunk is a search engine, and it takes the available logs. What's the technology you're using to take these logs? maybe the solution is in the integration between your solution a... See more...
Hi @inessa40408 , Splunk is a search engine, and it takes the available logs. What's the technology you're using to take these logs? maybe the solution is in the integration between your solution and Splunk. Ciao. Giuseppe
Hi @Rak , surely append and stats is better than join, but anyway, I hint to analyze my approach and try to use it because is faster and it hasn't the limit of 50,000 results in the subsearch. Cia... See more...
Hi @Rak , surely append and stats is better than join, but anyway, I hint to analyze my approach and try to use it because is faster and it hasn't the limit of 50,000 results in the subsearch. Ciao. Giuseppe
Does it work you run the script using the debugger, but uncheck the checkbox that says "Run as current user"? Also if I understand correctly, you are not using the SOAR winRM (Windows Remote Managem... See more...
Does it work you run the script using the debugger, but uncheck the checkbox that says "Run as current user"? Also if I understand correctly, you are not using the SOAR winRM (Windows Remote Management) app, but you are instead using a different app to trigger a script, or using a custom function that implements WinRM communication?
Probably the cleanest way to do this is as @tscroggins suggested: Make a browser extension that changes the interface. Another workaround would be to ignore the app drop-down menu completely and ins... See more...
Probably the cleanest way to do this is as @tscroggins suggested: Make a browser extension that changes the interface. Another workaround would be to ignore the app drop-down menu completely and instead make a navigation menu in your apps which has links to the various app versions and supports multi-drop-down. It may be cumbersome to maintain but it will look better.
If I understand correctly, you have a windows system with a logfile that does not have a long log retention time, so you cannot use the log file to look back very far, but you need to be able to look... See more...
If I understand correctly, you have a windows system with a logfile that does not have a long log retention time, so you cannot use the log file to look back very far, but you need to be able to look further back in time. This sounds like a straightforward use case for the Splunk forwarder. If you install the forwarder on the machine, then set up an input configuration to monitor that logfile, then the forwarder will send the log data to the Splunk indexers where it will be indexed and stored for longer times.
I don't see why not. From Splunk's perspective it's just a remote storage regardless of where the indexers are. As long as you have network connectivity you should be fine. I suppose it might cost y... See more...
I don't see why not. From Splunk's perspective it's just a remote storage regardless of where the indexers are. As long as you have network connectivity you should be fine. I suppose it might cost you more if you have inter-region traffic instead if intra-region one but I'm not that good on AWS pricing to say somethig definite here. And it's an issue completely outside of Splunk.
Can Splunk SmartStore enabled with single site Indexer clustering which is spanning across two AWS regions?  Ex: One set of Indexer Cluster located in AWS Region A and another Set of Indexer Cluster ... See more...
Can Splunk SmartStore enabled with single site Indexer clustering which is spanning across two AWS regions?  Ex: One set of Indexer Cluster located in AWS Region A and another Set of Indexer Cluster sitting in Region B, Can one s3  Remote Object Store used with all Indexers from both Clusters?  Thanks.
Hi @robertlynch2020, I'm not aware of a native method, although you could override the Splunk bar's behavior with a browser extension, assuming you control the browser. My preference is to customiz... See more...
Hi @robertlynch2020, I'm not aware of a native method, although you could override the Splunk bar's behavior with a browser extension, assuming you control the browser. My preference is to customize the launcher or provide a default app with customized navigation menus.
Hello Splunk community,   We have a device on the windows systeme. I tried to find a LOG file on it that is responsible for the Internet connection and connection quality. But unfortunately, this ... See more...
Hello Splunk community,   We have a device on the windows systeme. I tried to find a LOG file on it that is responsible for the Internet connection and connection quality. But unfortunately, this screen saves a limited amount of information in its LOG files regarding the Internet connection.   I wanted to know, does Splunk have a solution for such situations? Perhaps there is an application that we can install on this device that will allow us to erase the necessary LOGs?   Thank you in advance for you answer  
Can you share a screen cap of the options there but not available to click on? Interim shot in the dark - ask for a rolling restart on the ITSI SH or SHC - assuming you've done this before so shou... See more...
Can you share a screen cap of the options there but not available to click on? Interim shot in the dark - ask for a rolling restart on the ITSI SH or SHC - assuming you've done this before so shouldn't be a permissions/capability issue - perform a log out and clear cache on browsers, I know you've tried more than one already
The apps menu toggle recognizes individual unique apps.  The fact that it appears you have the same app multiple times is an indication the app is not designed per best practices.  Even if the versio... See more...
The apps menu toggle recognizes individual unique apps.  The fact that it appears you have the same app multiple times is an indication the app is not designed per best practices.  Even if the version number is in the title the app should be replacing itself so that you are only ever seeing the most recent install. Options a) Fix app so that it install over itself rather than creating unique instances b) Start removing older versions that serve no purpose anymore
Classic XML dashboards wont let you extend multiple rows.