All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Using Dashboard Studio, I am having trouble adding a drilldown that will allow me to see the attributing events of the dashboard selection. There only appears to be a way to add links to the open int... See more...
Using Dashboard Studio, I am having trouble adding a drilldown that will allow me to see the attributing events of the dashboard selection. There only appears to be a way to add links to the open internet? The only options for drilldown are  No Action or Link to custom URL  Use a relative URL or absolute URL, for example, /app/search/datasets, or https://www.splunk.com Am I missing something?  Did I create the alert incorrectly?
Hello, I could use a little help with displaying the results of a search.  I have to display 4 search results on a page. Search A(5 results) Search B (2 results) Search C (4 results) Sear... See more...
Hello, I could use a little help with displaying the results of a search.  I have to display 4 search results on a page. Search A(5 results) Search B (2 results) Search C (4 results) Search D(3 results) Each of the items has a different search associated with it. Based on what is clicked, a search needs to run and display data in a a table. Also, this is in Dashboard Studio. The searches and the results need to be visible on the page and not in a dropdown.  Can someone point me in the right direction ?    
Hi, I recently watched an instructional video on Splunk attack range. I am wondering: Does splunk attack range allow me to test more than one server or workstation at a time? Am I limited in which ... See more...
Hi, I recently watched an instructional video on Splunk attack range. I am wondering: Does splunk attack range allow me to test more than one server or workstation at a time? Am I limited in which of my security tools I can use during the test for example if I wanted to test a new crowdstrike policy would that be possible using splunk attack range?   Thanks for your time! Adam
Hi As you can see, I use a first eval in order to rename the field "site" From the site renamed, I need to create a new field called "toto" in order to add new information for the field site. S... See more...
Hi As you can see, I use a first eval in order to rename the field "site" From the site renamed, I need to create a new field called "toto" in order to add new information for the field site. So I create an eval if command like below but it doesn't work. What is wrong please and is there another simple way to do this?   | eval site=case(site=="BR", "Espace Br", site=="PERI THEATRE", "Espace Périg", 1==1,site) | stats last(site) as "Espace BP" by s | eval toto=if("Espace BP"=="Espace Br", "4G") | table "Espace BPE" toto    
Hi, I have fields from a JSON file that are getting parsed like this:  I'm struggling to find a way to turn those fields into columns in a table. Anyone have any experience with this?    T... See more...
Hi, I have fields from a JSON file that are getting parsed like this:  I'm struggling to find a way to turn those fields into columns in a table. Anyone have any experience with this?    Thank you  
we are using splunk cloud  i want to know how much data indexed per index. is there anyway to check.   Thanks   
Hai , Is there any way to check Splunk forwarder even HF/UF stops sending data to Splunk cloud?  
Hello humans (and non-humans),  I am rocking the base model Enterprise (9.0) with an InfoSec app as my SIEM. Right now I see all of the scanner activity, along with service accounts. Since my scanne... See more...
Hello humans (and non-humans),  I am rocking the base model Enterprise (9.0) with an InfoSec app as my SIEM. Right now I see all of the scanner activity, along with service accounts. Since my scanners are testing for Apache vulns, I am getting alerts for it. Is there a way to prevent the InfoSec app from reporting "asset list" worthy events? My understanding is that Asset Lists are only configurable on ES. Thank you! theSOCguy 
We are unable to connect Pihole to Splunk, we have configured the pihole to SPLUNK but we are unable to view the dashboard with the data on SPLUNK. We tried doing the installation and configuration p... See more...
We are unable to connect Pihole to Splunk, we have configured the pihole to SPLUNK but we are unable to view the dashboard with the data on SPLUNK. We tried doing the installation and configuration process the way it was given on this website. https://thetechnologistchap.com/index.php/2022/01/08/pi-hole-as-a-cyber-security-tool-pt-3-installing-a-splunk-server/ However, after following this instruction we got the error message "TCP output processor has paused the data flow....." and an empty dashboard. I will be glad if anyone could throw some light on this matter.
Hello! I am deploying a custom input to a cluster of Heavy Forwarders from a Deployment Server.  Since I only want the input to be active on one HF I have set disabled=1 on the DS.  After deploying ... See more...
Hello! I am deploying a custom input to a cluster of Heavy Forwarders from a Deployment Server.  Since I only want the input to be active on one HF I have set disabled=1 on the DS.  After deploying I SSH into the HF I want to enable the input on and create local/inputs.conf and set disabled=0 and restart. I thought this was the way forward since I didn't think reloading the DS would cause the local folder to be overwritten, but after making a change and redeploying I notice that this does in fact happen. My question: how can I stop the DS from overwriting the local folder so it's easier to manage my HFs? Thanks! Andrew
I am new to appdynamics and need help on how to configure kubernetes PODs in AppDynamics. 
Hello, I am trying to find a native solution in order to monitor the execution of a Phantom Playbook. In case one of the actions fail, or a specific message/data is returned by a custom function, d... See more...
Hello, I am trying to find a native solution in order to monitor the execution of a Phantom Playbook. In case one of the actions fail, or a specific message/data is returned by a custom function, does anyone a possibility to make a general/native configuration, so that an admin will receive an instant email message with the error/playbook that ran/ etc? I am aware of the api 'error' and 'discontinue' methods, but it will mean to add this kind of checks at each step of the playbook ... Greatly appreciate your ideas!
I am upgrading a 6.6.X Splunk Enterprise and following the upgrade manual, I have to upgrade it to version 7.2.x first but... it wasn't listed on the older version download page, and I can't find any... See more...
I am upgrading a 6.6.X Splunk Enterprise and following the upgrade manual, I have to upgrade it to version 7.2.x first but... it wasn't listed on the older version download page, and I can't find anything about upgrading without downloading it first.  I'm in need of .rpm, .deb and .tgz. Where can I download Splunk Enterprise 7.x?  I was able to download Splunk Enterprise 8.x and Enterprise 9.x. Thanks for any info! Regards, Sobo
I am unable to install apps on SPLUNK, even though my username and password are correct. I tried with both my solunk.com credentials and also with my Splunk enterprise credentials. I tried clearing c... See more...
I am unable to install apps on SPLUNK, even though my username and password are correct. I tried with both my solunk.com credentials and also with my Splunk enterprise credentials. I tried clearing cookies, logging out and also tried changing my password and logging in.  May I please know if there is any other method to solve this issue.
Hi Community, I have a really strange issue and I'm wondering if this is not affecting quite everyone who is installing Splunkbase apps: It happens even on a clean and freshly started Splunk:   d... See more...
Hi Community, I have a really strange issue and I'm wondering if this is not affecting quite everyone who is installing Splunkbase apps: It happens even on a clean and freshly started Splunk:   docker run -ti --rm -e SPLUNK_START_ARGS="--accept-license" -e SPLUNK_PASSWORD="<redacted>" -p 8000:8000 splunk/splunk:latest   When I log in and want to install an App from Splunkbase: Manage Apps -> Browse more apps -> Select ANY App -> Login to Splunkbase, Agree and Install I get the error message:   Invalid app contents: archive contains more than one immediate subdirectory: and timeline_app   As I said this happens with any app. Downloading the file from Splunkbase and installing it either in the UI or the command line yields the same error. Do you have any idea? Can you reproduce this behaviour? I don't know what could be special on my configuration.
Hi everyone, Our team is currently looking for a way to make several dashboards be accessible to our business users who may not have a Splunk account. Specifically by giving them a Sharepoint link t... See more...
Hi everyone, Our team is currently looking for a way to make several dashboards be accessible to our business users who may not have a Splunk account. Specifically by giving them a Sharepoint link that will contain the links to each report. Upon checking with the our company's Splunk support team. They mentioned that it would not be possible and we would have to add those users manually via our ticketing system which would cause some delay that we would want to avoid. Just wanted to check if there is be a way to do this within the dashboard to bypass such ruling that they aren't familiar with? Let me know if there are anything you need to clarify. Please and thank you!
Hello team, I have problems with configuring Splunk with keycloak by SAML, every time it shows me an invalid request. Is it possible to propose to me the track how I can make this configuration. Best... See more...
Hello team, I have problems with configuring Splunk with keycloak by SAML, every time it shows me an invalid request. Is it possible to propose to me the track how I can make this configuration. Best regards.
Trying to find out if I can go directly from Splunk Enterprise 8.2.6 to Splunk Enterprise 9.0
Hello, In our environment we are dealing with hundreds of GB/day of logs coming from Firewalls. Despite having already fixed some noisy sources we are in difficulty to reduce the load. I was wo... See more...
Hello, In our environment we are dealing with hundreds of GB/day of logs coming from Firewalls. Despite having already fixed some noisy sources we are in difficulty to reduce the load. I was wondering if any of you have already tackled this problem. Our configuration is:     FW --> Load Balancer --> Syslog servers --> file --> Splunk HFs --> Splunk Indexer     The Splunk HFs are installed on the same servers where the syslog service is running. Syslog receives the data from Firewalls, write them into a file, then Splunk HF monitor those files. The idea is to use a component that every "n" minutes consolidate/summarize the information written into the file by the syslog server and produce an output with a summary. The summarized file is then read by Splunk HF.     FW --> Load Balancer --> Syslog servers --> file --> Summarization tool --> summarized file --> Splunk HFs --> Splunk Indexer     I can write a script for this use case, but do you know if there is already a tool that can do the job? I was checking logwatch, maybe you have a better suggestion.   Thansk a lot, Edoardo
How to disable deployment server temporarily ? After disable the DS temporarily, will the apps be deleted from client ? will there be any issues with the functionality  after enabling the DS ? and ... See more...
How to disable deployment server temporarily ? After disable the DS temporarily, will the apps be deleted from client ? will there be any issues with the functionality  after enabling the DS ? and can we again push the apps normally after re-enabling the DS ?