All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

I need to collect data using HEC from an Internet source into my on-prem Splunk environment. It looks like I can run HEC on a Heavy Forwarder and then forward the collected data to my indexer cluster... See more...
I need to collect data using HEC from an Internet source into my on-prem Splunk environment. It looks like I can run HEC on a Heavy Forwarder and then forward the collected data to my indexer cluster. I will use https so the communication is encrypted and DNS and networking/firewall shouldn't be a problem. Any gotchas or issues using a HF with HEC in a DMZ to collect and forward data to an on-prem indexer cluster?
A dashboard which uses tabs.js and tabs.css worked all along and suddenly we get the error message -    A custom JavaScript error caused an issue loading your dashboard, likely due to the das... See more...
A dashboard which uses tabs.js and tabs.css worked all along and suddenly we get the error message -    A custom JavaScript error caused an issue loading your dashboard, likely due to the dashboard version update. See the developer console for more details.     What can it be?  
Dear splunk community: I have the following search query which basically shows the number of counts and percentage of url (Y-Axis) http status code (X-Axis): <basic search> | chart count by url, ... See more...
Dear splunk community: I have the following search query which basically shows the number of counts and percentage of url (Y-Axis) http status code (X-Axis): <basic search> | chart count by url, http_status_code | addtotals fieldname=total | foreach 2* 3* 4* 5* [ eval "percent_<<FIELD>>"=round(100*'<<FIELD>>'/total), "<<FIELD>>"='<<FIELD>>'." (".'percent_<<FIELD>>'."%)" ] | fields - percent_* total Here is a sample of the above query result: Now, i need to insert an if clause so that if the percentage is either 0 OR 100, then do NOT display the percentage. How would i do that to the above query to get this result? Thank you very much for your help!  
Hello, I need some guidance to install CyberArk TA in a single-server SPLUNK enterprise environment. How would I proceed with this installation process? Any help will be highly appreciated. Thank y... See more...
Hello, I need some guidance to install CyberArk TA in a single-server SPLUNK enterprise environment. How would I proceed with this installation process? Any help will be highly appreciated. Thank you so much.
I need only url column results in blue remaining 4 fields in just text (i.e Black) color    i want something like below     <row> <panel> <table> <search> <... See more...
I need only url column results in blue remaining 4 fields in just text (i.e Black) color    i want something like below     <row> <panel> <table> <search> <query>|inputlookup testing.csv | eval ClickHere= url | table _time duration_seconds dv_assignment_group dv_number dv_u_substate url </query> <earliest>$field1.earliest$</earliest> <latest>$field1.latest$</latest> <sampleRatio>1</sampleRatio> </search> <option name="count">100</option> <option name="dataOverlayMode">none</option> <option name="drilldown">cell</option> <option name="percentagesRow">false</option> <option name="rowNumbers">false</option> <option name="totalsRow">false</option> <option name="wrap">true</option> <format type="number" field="dv_u_substate"></format> <drilldown> <condition field="url"> <link target="_blank">$row.url|n$</link> </condition> <condition field="*"></condition> </drilldown> </table> </panel> </row>
I am making custom Splunk command that looks to see if today a holiday and changes the threshold if it is. if it's a holiday, would I just use "if" command to change the threshold value. Current py... See more...
I am making custom Splunk command that looks to see if today a holiday and changes the threshold if it is. if it's a holiday, would I just use "if" command to change the threshold value. Current python code  # changing threshold value if today != us_holidays: int() >>> "123131241".isdigit() True  
We have data on a Splunk instance that needs to be retained for audit purposes. The new instance owner will not allow the old data to be ingested. What would be method to retain data for required tim... See more...
We have data on a Splunk instance that needs to be retained for audit purposes. The new instance owner will not allow the old data to be ingested. What would be method to retain data for required time period without retaining old instance?
@douglashurdI had eStreamer Add-on v5.1.3 installed and believe the bytes-in/bytes-out and packets-in/packets-out are inverted. From cisco:firepower:syslog raw event - SrcIP: [Internet-IP], DstIP... See more...
@douglashurdI had eStreamer Add-on v5.1.3 installed and believe the bytes-in/bytes-out and packets-in/packets-out are inverted. From cisco:firepower:syslog raw event - SrcIP: [Internet-IP], DstIP: [Firewall-IP], InitiatorPackets: 1, ResponderPackets: 0, InitiatorBytes: 54, ResponderBytes: 0 parsed fields - src_ip = [Internet-IP], dest_ip = [Firewall-IP], packets_received = 0, bytes_out = 54, From cisco:estreamer:data raw event - src_ip= [Internet-IP], dest_ip= [Firewall-IP], src_pkts=1, dst_pkts=0, src_bytes=54, dest_bytes=0 parsed fields - src_ip = [Internet-IP], dest_ip = [Firewall-IP], packets_in=1 , packets_out=0, bytes_in=54, bytes_out=0 As you can see in the parsed events, that the syslog event indicates 54 bytes sent outbound, while the eStreamer logs indicates the bytes are inbound. I believe the the raw logs in both cases indicate that the bytes were sent outbound, so I think the cisco:estreamer:data parser may be incorrect here. Thanks, Gord T.
Hi all, I am trying to extract threshold values I have defined for some BTs under an app. I can find API calls to get controller level settings, health rules, apps in a controller etc. but nothing ... See more...
Hi all, I am trying to extract threshold values I have defined for some BTs under an app. I can find API calls to get controller level settings, health rules, apps in a controller etc. but nothing like threshold settings (the ones that are used to classify a transaction as slow/very slow). Anyone aware of a solution for this? regards Philippe
I need to know where i can view the source index of the event that Splunk Enterprise Security take to make an alert, because is showing me that is from risk index.
Hi, Can someone help me with field extraction for string : /home/mysqld/databasename/audit/audit.log I want to extract databasename as Database to be used  i have written regex but getting erro... See more...
Hi, Can someone help me with field extraction for string : /home/mysqld/databasename/audit/audit.log I want to extract databasename as Database to be used  i have written regex but getting error, can someone help with correct regex: rex field=source "\/home\/\/mysqld\//(?&lt;Database&gt;.*)/audit\/"
We're using a Universal Forwarder, I'm manually updating the inputs.conf file, I do not see the changes being reflected when searching on Splunk UI. I have restarted the forwarder. I'm not sure
Hello, I have a .csv with 2 columns: hostname and ip. How can I exclude the IPs from that list ? Tried something like this, but it doesn't work: src_ip="[|inputlookup ip_list.csv | fields ip]"
Hi Splunk Experts, I have configured custom application on deployment server, however my linux universal forwarder is not appearing for App client config.  And also not appearing in forwarder man... See more...
Hi Splunk Experts, I have configured custom application on deployment server, however my linux universal forwarder is not appearing for App client config.  And also not appearing in forwarder management clients section  . On Linux Universal Forwarder,  config for the deployment  server and Communication also allowed between UF and DS server. However server is not appearing  Commands : splunk set deploy-poll 10.1.1.30:8086                          splunk restart    
How do I know if a TA is used by any user. I have a TA laying around, and I doubt is is been used. But before removing wanted to make sure it is truly unused.  
Hello I have a search which is gathering 8 columns from a table. (below) I want to make col1 available to query against later in the SPL. I tried to access via "rename query.col1 as col1" for e... See more...
Hello I have a search which is gathering 8 columns from a table. (below) I want to make col1 available to query against later in the SPL. I tried to access via "rename query.col1 as col1" for example but the data does not seem to appear, almost as if query.col1 is not valid? Can't find any info on how to remedy this elsewhere on the site, apologies if this has been asked before. The query returns 1 row.             | dbxquery query="Select col1,col2,col3,col4,col5,col6,col7,col8 from JuiceTable where col1 = 'special value'" connection="Juice-Prod" | stats count as total | eval Status=case(total=0,"Healthy",total > 0, "Critical")            
I'm trying to do a search with a lookup table and can't seem to get the search to perform what I'm wanting. I have some data that produces a table output like below. _time user interestin... See more...
I'm trying to do a search with a lookup table and can't seem to get the search to perform what I'm wanting. I have some data that produces a table output like below. _time user interesting 8/18/22 user1 a few words here   I have a lookup table with a list of words in it. The lookup table has a header of "Words" and a list of words separated by line feed. I would like to perform a search where I get back the sub results of the main search where a single word in my lookup matches anywhere in the interesting field. I got a partial match with the following search.   my search terms | lookup WordsLookup.csv Words as Interesting OUTPUT Words | table _time, user, Interesting, Words   In this case, it will return all results for my search terms and only a match where the Interesting field is EXACTLY the lookup of Words. I set WILDCARD(Words) in the lookup definition.   Help? Thanks
Hello Splunkers,   How to check when splunk's automatic processing has been executed ?   for example:-   1.scheduled processing 2.real-time processing  
Hi All, I am new to Splunk and the SPL in general so I will try and explain as best I can.  I have been tasked to produce an UP/DOWN dashboard to show different Microsoft Cloud services and their s... See more...
Hi All, I am new to Splunk and the SPL in general so I will try and explain as best I can.  I have been tasked to produce an UP/DOWN dashboard to show different Microsoft Cloud services and their statuses.  We are importing data from the Microsoft Service Health and can run searches on it.  I am able to find each service (Microsoft Teams, Exchange Online, SharePoint Online etc) and their current status (up or down).  Now I need to show this in a dashboard but my manager wants to group the services in categories like, Core services, Productivity and Cloud Apps so that if a person navigates tot he dashboard they can click a dropdown and select the category then those services are displayed  with their UP/DOWN status.   Any help would be much appreciated.
I have scheduled report which will give the result of hostname and some other details in the table format and now i need to use this schedule report to get the same output in my dashboard. The dashbo... See more...
I have scheduled report which will give the result of hostname and some other details in the table format and now i need to use this schedule report to get the same output in my dashboard. The dashboard should not rerun everytime i open it.  For example: i have scheduled report which will run everyday at 00:00 and return the details in table format and the same details should be shown in dashboard untill the next schedule report runs. can anyone help how to work on this