All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Y'all, I have events from a windows eventlog and the application writes time with ms precision into the Message field of the event, along with other app data. So the Message field looks like: Mes... See more...
Y'all, I have events from a windows eventlog and the application writes time with ms precision into the Message field of the event, along with other app data. So the Message field looks like: Message=2022-05-05 22:34:11.756|lots|of|app|logging|pipe|seperated matching the strftime format "%Y-%m-%d %H:%M:%S.%3N"  I have this in my props.conf (There are no "quotation marks" around the message value in event) [WinEventLog:RPA] TIME_PREFIX = Message= TIME_FORMAT = %Y-%m-%d %H:%M:%S.%3N SHOULD_LINEMERGE = false LINE_BREAKER = ([\r\n](?=\d{2}/\d{2}/\d{2,4} \d{2}:\d{2}:\d{2} [aApPmM]{2})) But I still get all events tagged with the time (probably from the win event time) with second accuracy, not ms. I check that with a search like index=my_app_events source="WinEventLog:MyApp"  | convert timeformat="%Y-%m-%d %H:%M:%S.%3N" ctime(_time) | table _time Message Is it possible to have ms accuracy in _time (I saw somewhere that it was second granularity) or am I missing something else? Thanks In Advance, R. P.S. For bonus points in some error cases the Message= field will contain error data with no timestamp. In such a case of course I want to fall back the the Windows Event timestamp 
I have a macro that starts with a search command.  When I ran it, I noticed I was getting a different number of results than if I just ran the raw SPL vs using the macro. As an example my macro was... See more...
I have a macro that starts with a search command.  When I ran it, I noticed I was getting a different number of results than if I just ran the raw SPL vs using the macro. As an example my macro was named open_vulnerabilities and the SPL was:       search index="vulnerabilities" severity_id>=2 state!="fixed"       If I use the macro in the search bar like this:       `open_vulnerabilities`       I would get say 10 results.  But if I ran the full SPL (index="vulnerabilities"...) then I'd get 100 results. I ended up figuring out that if I used a | before the macro name, like this       | `open_vulnerabilities`        then I'd get the number of results I expected.  I just don't understand why.  If I got 0 results, then it would make some sense but the fact that it's returning 10 really has me stumped.  Any help would be greatly appreciated.  Thanks
Hi,   I am using a Case statement to create a new field whose values depend on certain other fields taking other value. So, the new field I am creating is called "XYZ". For events whose field "... See more...
Hi,   I am using a Case statement to create a new field whose values depend on certain other fields taking other value. So, the new field I am creating is called "XYZ". For events whose field "Planned Migration Completion Iteration" has a value beginning with "Decom by", then the "XYZ" field would have a value of "Done". Similarly,  for events whose field "Migration Comments" has a value equal to "In progress", then the "XYZ" field would have a value of "In progress". Finally, for all other scenarios, the XYZ takes the value of "Not Started". However, this is what my current Case statement looks like, where it ONLY outputs the "Not Started" case:   Can you please help? Many thanks
Is it possible to allow users the interactive capability of selecting between light and dark mode theme by way of an input field?  I tried: <form theme="$background_theme_token$> along with an in... See more...
Is it possible to allow users the interactive capability of selecting between light and dark mode theme by way of an input field?  I tried: <form theme="$background_theme_token$> along with an input field for that token ( light or dark selection ) and was not able to get it to work. Any suggestions or is this not doable in the Classic dashboard (XML) world? Thanks in advance, Bob
I am trying to do a search where by:   index=firewall (src_ip=172.16.0.0/12)  dest_ip!(172.16.0.0/12) | table src_ip src_port dest_ip dest_port | dedup src_ip   When I run this search I still... See more...
I am trying to do a search where by:   index=firewall (src_ip=172.16.0.0/12)  dest_ip!(172.16.0.0/12) | table src_ip src_port dest_ip dest_port | dedup src_ip   When I run this search I still see 172.16.0.0/12 destination IP addresses.  I've also tried it this way: index=firewall (src_ip=172.16.0.0/12) NOT  dest_ip! IN (172.16.0.0/12) | table src_ip src_port dest_ip dest_port | dedup src_ip
Hi everyone I am currently getting logs from microsoft 365 and one of its panels shows the impossible simultaneous locations. When I check the IP with any page for whois like virustotal or abusei... See more...
Hi everyone I am currently getting logs from microsoft 365 and one of its panels shows the impossible simultaneous locations. When I check the IP with any page for whois like virustotal or abuseipdb, for example, from Sweden, I find that it really is from another country. Is there something wrong with the iplocation command or something I need to adjust How can it be solved?
Hi All, There are lots of forum topics here on this but I'm really struggling to get my head around it.  I have the following information in JSON:      { "4": { "state": { ... See more...
Hi All, There are lots of forum topics here on this but I'm really struggling to get my head around it.  I have the following information in JSON:      { "4": { "state": { "on": false, "bri": 254, "hue": 8418, "sat": 140, "effect": "none", "xy": [ 0.5053, 0.4152 ], "ct": 454, "alert": "select", "colormode": "ct", "mode": "homeautomation", "reachable": false }, "swupdate": { "state": "transferring", "lastinstall": "2020-03-03T14:19:37" }, "type": "Extended color light", "name": "Hue lightstrip plus 1", "modelid": "LST002", "manufacturername": "Signify Netherlands B.V.", "productname": "Hue lightstrip plus", "capabilities": { "certified": true, "control": { "mindimlevel": 40, "maxlumen": 1600, "colorgamuttype": "C", "colorgamut": [ [ 0.6915, 0.3083 ], [ 0.17, 0.7 ], [ 0.1532, 0.0475 ] ], "ct": { "min": 153, "max": 500 } }, "streaming": { "renderer": true, "proxy": true } }, "config": { "archetype": "huelightstrip", "function": "mixed", "direction": "omnidirectional", "startup": { "mode": "safety", "configured": true } }, "uniqueid": "00:17:88:01:04:06:ae:3d-0b", "swversion": "1.50.2_r30933", "swconfigid": "59F2C3A3", "productid": "Philips-LST002-1-LedStripsv3" }, "5": { "state": { "on": false, "bri": 144, "hue": 7676, "sat": 199, "effect": "none", "xy": [ 0.5016, 0.4151 ], "ct": 443, "alert": "select", "colormode": "xy", "mode": "homeautomation", "reachable": true }, "swupdate": { "state": "noupdates", "lastinstall": "2021-08-13T13:53:48" }, "type": "Extended color light", "name": "Upstairs Hall", "modelid": "LCT015", "manufacturername": "Signify Netherlands B.V.", "productname": "Hue color lamp", "capabilities": { "certified": true, "control": { "mindimlevel": 1000, "maxlumen": 806, "colorgamuttype": "C", "colorgamut": [ [ 0.6915, 0.3083 ], [ 0.17, 0.7 ], [ 0.1532, 0.0475 ] ], "ct": { "min": 153, "max": 500 } }, "streaming": { "renderer": true, "proxy": true } }, "config": { "archetype": "sultanbulb", "function": "mixed", "direction": "omnidirectional", "startup": { "mode": "safety", "configured": true } }, "uniqueid": "00:17:88:01:04:ff:49:53-0b", "swversion": "1.88.1", "swconfigid": "76B74E79", "productid": "Philips-LCT015-1-A19ECLv5" },     I am wanting information for "4" and "5" to be ingested as separate events at index time. I understand that one could use regex to filter this properly, but honestly I'm struggling to wrap my head around how.  Any help would be massively appreciated. Many Thanks, John
I'm writing a piece of code that actually happens in a distributed system pipeline. I need to paginate on search result and I can't retrieve all the results in one go (the results may be bigger tha... See more...
I'm writing a piece of code that actually happens in a distributed system pipeline. I need to paginate on search result and I can't retrieve all the results in one go (the results may be bigger than the batch_size that the components  can use). I've managed to use retrieve the old job by sid2='1654105815.20373' old_job = service.job(sid2)   However sometime the jobs expires and I do have problems getting the result. for result in results.JSONResultsReader(old_job.events(**{"count": total_size, "output_mode": "json","offset":800})): if isinstance(result, results.Message): print(result) elif isinstance(result, dict final_res.append(result) always does not return anything (no values )are present. Any advice?
Is there a way to change the order of the "stack_trace" attribute, so it shows up last within the log message ?
I didn't find the cloud documentation very clear... Do I need to install splunk enterprise separately to have heavy for warder and then configure my splunk cloud license? Do I need to ask splunk su... See more...
I didn't find the cloud documentation very clear... Do I need to install splunk enterprise separately to have heavy for warder and then configure my splunk cloud license? Do I need to ask splunk support for an enterprise license? After all, how do I configure a heavy forwarder? And what address do I put in Universal forwarder? From the IP or hostname cloud? I've read the following threads and it gets more and more confused: https://www.splunk.com/en_us/resources/videos/splunk-cloud-tutorial.html https://community.splunk.com/t5/Getting-Data-In/How-to-set-up-a-heavy-forwarder-to-forward-data-to-Splunk-Cloud/m-p/250588 https://docs.splunk.com/Documentation/SplunkCloud/8.2.2202/Admin/WindowsGDI  Step2 Can you help me please?   Regards
Hello I'm using the new dashboard studio, and have a couple of single value and single value + trending components. I want these to show a "0" when no results are available for a given component in... See more...
Hello I'm using the new dashboard studio, and have a couple of single value and single value + trending components. I want these to show a "0" when no results are available for a given component instead of the default icon:   the single value has a |timechart count at the end and shows results when available, however it shows the default when no results are available and is something I want to fix, to make it clearer to the user. While I tried with |fillnull , |fillnull value=0 count and even adding "shouldSparklineAcceptNullData":true in the code section for that single value, nothing seems to address this problem.   Any idea how can I have a 0 showing ? I have read multiple questions around the same topic, however no of the answers I found seems to work for me sadly. Thanks in advance for any help this awesome community can provide.  
I am running Splunk Enterprise and am trying to create a dashboard panel "Events" search string that pulls multiple Windows Event Log Codes. I am using variations of the code below: index=windows* ... See more...
I am running Splunk Enterprise and am trying to create a dashboard panel "Events" search string that pulls multiple Windows Event Log Codes. I am using variations of the code below: index=windows* sourcetype="WinEventLog:Security" (EventCode>="630" AND EventCode<="640") OR EventCode="641" OR (EventCode>="647" AND EventCode<="668") OR (EventCode>="4726" AND EventCode<="4736") OR EventCode="4737" OR (EventCode>="4743" AND EventCode<="4763") OR EventCode="4764" OR (EventCode>="4782" AND EventCode<="4793") I also tried this search to no avail: sourcetype=wineventlog source="WinEventLog:Security" host="xxxx*" EventCode=4625,4624 When I used the second code without the (,4624) it will populate events with 4625 but I have not figured out how to make it pull more than one Event Code properly. It doesn't populate any errors or text failures. It simply presents "no results found. Try expanding the time range" which I went from 15 mins up to YTD. Does Anyone have a Windows Event Search command bank they could share or tell me what to read/explain how to correct my line of code? Thanks! P.S. the (host=XXXX*) is used as a place holder for my organizations host name
Hi, we have one syslog input where we receive log data from two different sources. One runs on local time, i.e. CEST, and carries a distinct string "abc", while the other runs on UTC and carries ... See more...
Hi, we have one syslog input where we receive log data from two different sources. One runs on local time, i.e. CEST, and carries a distinct string "abc", while the other runs on UTC and carries "def". For some unknown reason the UTC one doesn't carry "UTC" or "+00:00" with it, that information got stripped in transfer. Therefore it is currently off by two hours. To fix that, I want to pass the "abc" through unchanged, and set "UTC" on the "def", so that it will be correctly displayed at search time. My experiments with props.conf and transforms.conf (and datetime.xml) were not successful, since once the timezone is set at input time, it seems impossible to change it selectively for "def". Transforming the sourcetype is easy, but then it is too late, and the same applies to the host, so setting the TZ depending on a transformed parameter is not an option. Any ideas, apart from a conversation with the people who send the broken data? Thanks in advance Volkmar
I have the following line in my splunk_metadata.csv to forward forcepoint proxy logs to the index called proxy_forcepoint. This worked when running the latest 1.x release. Post upgrade, some of the... See more...
I have the following line in my splunk_metadata.csv to forward forcepoint proxy logs to the index called proxy_forcepoint. This worked when running the latest 1.x release. Post upgrade, some of the events still go into the index above (these have the sc4s_vendor_product field set to forcepoint), whereas other events are delivered to the lastchanceindex (these to not have a field sc4s_vendor_product) Looking in app-syslog-forcepoint_webprotect.conf (from the source from 2.29 source), Forcepoint messages are recognised by "vendor=Forcepoint" (which all messages have), and if Product is "Security" (which all messages have) - then the rewrite rule should set "product("webprotect")".    So I cannot see what is obviously wrong in the configuration or events, or how to investigate the events to set the line in splunk_metadata.csv  appropriately to get the routing to happen as I wish   All help appreciated
I am encountering internal server errors when clicking on the open in search magnifying glass.  These are large queries (approximately 5.5K characters in the request).   Some details:  Splunk ver... See more...
I am encountering internal server errors when clicking on the open in search magnifying glass.  These are large queries (approximately 5.5K characters in the request).   Some details:  Splunk version is 8.2.2.1  Single search head with 2 indexers  Splunk is on-prem behind an Apache reverse proxy I tried setting the LimitRequestLine and LimitRequestFieldSize to larger values in the Apache config with no success. The Apache access_logs report the 500 error but no other really useful information.
HI, I am trying to recreate the same structure in Splunk which was created in excel. I have five fields week, total transactions, codes, count of codes and code percentage. Sample data are shown ... See more...
HI, I am trying to recreate the same structure in Splunk which was created in excel. I have five fields week, total transactions, codes, count of codes and code percentage. Sample data are shown below the first two column in blue should be represented in row wise and next three column in orange should be represented in column wise in Splunk table.   I want to display the week and total transaction in row wise followed by column codes showing the count and percentage of it in column wise for each code like below. Please let me know if it is possible? Thanks
Log Lines are as given below Reports obtained. MyId=NameOne, sId=s0, Reports=true, LogString= url=status.com, Type=base, Available=true, Tag=112434, Token=2356 url=status2.com, Type=error, Availab... See more...
Log Lines are as given below Reports obtained. MyId=NameOne, sId=s0, Reports=true, LogString= url=status.com, Type=base, Available=true, Tag=112434, Token=2356 url=status2.com, Type=error, Available=false, Tag=12345, Token=23567 Reports obtained. MyId=NameTwo, sId=s1, Reports=true, LogString= url=status3.com, Type=base, Available=true, Tag=12345876, Token=2356  I want to create a table as below MyId  sId Reports url Type Available Tag Token NameOne  s0 true status.com base true 112434 2356 NameOne  s0 true status2.com error false 12345 23567 NameTwo  s1 true status3.com base true 12345876 2356  
We have already migrated the KVstore storage engine to WiredTiger, but we still get a message at login as admin reminding us to complete this migration. How do I disable this permanently?
Team,  I have below timechart which is counting http error/success codes for a span of 1hr. Now I need to calculate the percentage increase (or decrease) in each error/success code based on previ... See more...
Team,  I have below timechart which is counting http error/success codes for a span of 1hr. Now I need to calculate the percentage increase (or decrease) in each error/success code based on previous hour. _time 200 4xx errors 5xx errors 2022-05-23 00:00 100 20 30 2022-05-23 01:00 200 30 30 2022-05-23 02:00 250 50 60 2022-05-23 03:00 300 30 50 2022-05-23 04:00 350 40 40 2022-05-23 05:00 400 60 60 2022-05-23 06:00 500 80 80
Hello all, I had a question that I have been trying to figure out how to address within a concise SPL query.  I have two lookups with a field name of X, lookup1 and lookup2 have all these values ... See more...
Hello all, I had a question that I have been trying to figure out how to address within a concise SPL query.  I have two lookups with a field name of X, lookup1 and lookup2 have all these values populated and I am trying to find a query to output the difference in field values for X between the two lookups.  lookup1's X value has a Multi-value field, where as lookup2 is only single values. E.g. Lookup1 has field values: Banana Apple Oranges   Lookup2 has field values: Banana   Expected output from desired query: Apple Oranges   Is there a way to do this between these two lookups with the above in mind? This seems feasible with one lookup, but comparing two lookups has proven to be difficult. Any support would be appreciated!