All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi , Thanks in Advance I am trying to onboard json file data to splunk .But i am not forwarding all the data from json file.   My json file format { "aaa": { "modified_files": [ "a/D:\\\... See more...
Hi , Thanks in Advance I am trying to onboard json file data to splunk .But i am not forwarding all the data from json file.   My json file format { "aaa": { "modified_files": [ "a/D:\\\\splunk\\\\Repos\\\\/.git/HEAD", "a/D:\\\\splunk\\\\Repos\\\\/.git/config", "a/D:\\\\splunk\\\\Repos\\\\/.git/index", "a/D:\\\\splunk\\\\Repos\\\\/.git/logs/HEAD"] }, "bbb": { "modified_files": [ "b/D:\\\\splunk\\\\Repos\\\\/.git/HEAD", "b/D:\\\\splunk\\\\Repos\\\\/.git/config", "b/D:\\\\splunk\\\\Repos\\\\/.git/index", "b/D:\\\\splunk\\\\Repos\\\\/.git/logs/HEAD" ]  } } I am getting result as like this { "aaa": { "modified_files": [ "a/D:\\\\splunk\\\\Repos\\\\/.git/HEAD", "a/D:\\\\splunk\\\\Repos\\\\/.git/config", "a/D:\\\\splunk\\\\Repos\\\\/.git/index", "a/D:\\\\splunk\\\\Repos\\\\/.git/logs/HEAD"
Search job won't finish and causing resource drain on shared indexers and ES. I am suspecting I might not be using 'tstats ' efficiently. Perhaps the two tstats are the culprit Any pointers on ho... See more...
Search job won't finish and causing resource drain on shared indexers and ES. I am suspecting I might not be using 'tstats ' efficiently. Perhaps the two tstats are the culprit Any pointers on how to use append with two tstats output?   
When Splunk loads dashboards after dashboard creation is complete, it is out of range or visually uncomfortable Is there a way to automatically resize the screen like Dashboard Classic?
I tried to create a dashboard within the Search Function. "Splunk dashboard that displays user searches" This is on Splunk Enterprise. Currently I am getting ("Server Error") Below is the entered c... See more...
I tried to create a dashboard within the Search Function. "Splunk dashboard that displays user searches" This is on Splunk Enterprise. Currently I am getting ("Server Error") Below is the entered command: <form theme="dark"> <label>Splunk Search Activity</label> <fieldset submitButton="true" autoRun="false"> <input type="time" token="time1"> <label></label> <default> <earliest>-24h@h</earliest> <latest>now</latest> </default> </input> <input type="radio" token="exclude1" searchWhenChanged="true"> <label>Splunk System User</label> <choice value="user!=splunk-system-user">exclude</choice> <choice value="*">include</choice> <default>user!=splunk-system-user</default> <initialValue>user!=splunk-system-user</initialValue> </input> <input type="multiselect" token="user1"> <label>User:</label> <fieldForLabel>user1</fieldForLabel> <fieldForValue>user</fieldForValue> <search> <query>index=_audit action=search search!="'typeahead*" $exclude1$ | stats count by user</query> <earliest>$time1.earliest$</earliest> <latest>$time1.latest$</latest> </search> <choice value="*">all</choice> <default>*</default> <initialValue>*</initialValue> <delimiter> </delimiter> </input> <input type="text" token="filter1"> <label>Search Filter:</label> <default>*</default> <initialValue>*</initialValue> <prefix>"*</prefix> <suffix>*"</suffix> </input> </fieldset> <row> <panel> <table> <search> <query>index=_audit action=search search!="'typeahead*" user="$user1$" search=$filter1$ $exclude1$ | stats count by _time user search total_run_time search_id app event_count | sort -_time</query> <earliest>$time1.earliest$</earliest> <latest>$time1.latest$</latest> <sampleRatio>1</sampleRatio> </search> <option name="count">20</option> <option name="dataOverlayMode">none</option> <option name="drilldown">none</option> <option name="percentagesRow">false</option> <option name="refresh.display">progressbar</option> <option name="rowNumbers">false</option> <option name="totalsRow">false</option> <option name="wrap">true</option> </table> </panel> </row> </form>
Any advice on how to fix this command? I pulled it from GoSplunk "Show all successful Splunk configurations by user." This is on Splunk Enterprise. Below is my entered command and I am getting the ... See more...
Any advice on how to fix this command? I pulled it from GoSplunk "Show all successful Splunk configurations by user." This is on Splunk Enterprise. Below is my entered command and I am getting the error: Comparator '=' has an invalid term on the left hand side: host=object index=_audit action=edit* info=granted operation!=list host= object=* | transaction action user operation host maxspan=30s | stats values(action) as action values(object) as modified_object by _time,operation,user,host | rename user as modified_by | table _time action modified_object modified_by  
Hi I have SPL like below: index="myindex" user | rex field=source "\/data\/(?<product>\w+)\/(?<date>\d+)\/(?<server>\w+)" | search server=server1 as we know first search "user" work more quickl... See more...
Hi I have SPL like below: index="myindex" user | rex field=source "\/data\/(?<product>\w+)\/(?<date>\d+)\/(?<server>\w+)" | search server=server1 as we know first search "user" work more quickly but second one "server=server1" take long time specially on large data. is there any way to search "search server=server1" more efficient like "user"? Thanks
Hi, I'm looking for users that login into an application and reset the password at the same time . The logs involved are like this:   Login: 1.1.1.1 - - [31/May/2022:11:15:03 +0200] "POST /se... See more...
Hi, I'm looking for users that login into an application and reset the password at the same time . The logs involved are like this:   Login: 1.1.1.1 - - [31/May/2022:11:15:03 +0200] "POST /servlet/Login HTTP/1.1" 200.....   Pwd Change: 1.1.1.1 - - [31/May/2022:11:15:03 +0200] "GET /PasswordChange/ HTTP/1.1" 200 .......   IP: 1.1.1.1 action : /servlet/Login, /PasswordChange   Ip and action are already extracted, So I need something like if IP1=IP2 and time1=time2 and action1=login and action2=pwdchange.   Thanks in advance!  
Hi I have exactly two SPL, same date range, one with "tracnsaction" command another wirhout it. as you see in picture without transaction timechart show correctly but with transaction last part m... See more...
Hi I have exactly two SPL, same date range, one with "tracnsaction" command another wirhout it. as you see in picture without transaction timechart show correctly but with transaction last part missed! FYI: 1-I've check log file correctly indexed and available. 2-pair of eachtransaction availabe in log in  missing part. what happen here? any idea?   Thanks  
Problem: Timestamp format setting is ignored when sending request I have created SourceType "test" with settings Timestamp format: %s,%3N Timestamp fields: time Created HTTP Event Collector wi... See more...
Problem: Timestamp format setting is ignored when sending request I have created SourceType "test" with settings Timestamp format: %s,%3N Timestamp fields: time Created HTTP Event Collector with settings Source Type: test Restarted Splunk And when making a request http://banana:8088/services/collector/event/1.0 Body: {     "time":"1653643363,529",     "sourcetype": "test",     "event":{         "id":"1",         "severity":"Information",         "message":"Test",     } } Response with status 400 is returned "text": "Error in handling indexed fields", "code": 15, "invalid-event-number": 0 Why is timestamp format ignored (works with "." but not with ",")?
Hi, I have an event display problem when no events matching the conditions are found. I want to filter only those events that have the "DATA_LAVORAZIONE" (STC) field greater than "OGGI" up to 7 day... See more...
Hi, I have an event display problem when no events matching the conditions are found. I want to filter only those events that have the "DATA_LAVORAZIONE" (STC) field greater than "OGGI" up to 7 days ahead. In the AMPLIAMENTI sourcetype there are some events for which it returns the sum, while in the DIRETTA sourcetype there are no events, and it does not show me anything. I would like the row with all 0s to be displayed anyway. I tried with fillnull value = 0 field, field, field .... but it doesn't work. Also tried fulldown, but nothing. Do you have any suggestions? Thank you   CODE: index =DATI sourcetype = AMPLIAMENTI |fields - _* |eval OGGI=strftime(relative_time(now(),"-0d@d"), "%Y-%m-%d") |eval OGGI_1=strftime(relative_time(now(),"+1d@d"), "%Y-%m-%d") |eval OGGI_2=strftime(relative_time(now(),"+2d@d"), "%Y-%m-%d") |eval OGGI_3=strftime(relative_time(now(),"+3d@d"), "%Y-%m-%d") |eval OGGI_4=strftime(relative_time(now(),"+4d@d"), "%Y-%m-%d") |eval OGGI_5=strftime(relative_time(now(),"+5d@d"), "%Y-%m-%d") |eval OGGI_6=strftime(relative_time(now(),"+6d@d"), "%Y-%m-%d") |eval OGGI_7=strftime(relative_time(now(),"+7d@d"), "%Y-%m-%d") |eval STC=strftime(strptime(DATA_LAVORAZIONE, "%Y-%m-%d"), "%Y-%m-%d") |where STC > OGGI |eval X = if(STC=OGGI,1,0) |eval X+1 = if(STC=OGGI_1,1,0) |eval X+2 = if(STC=OGGI_2,1,0) |eval X+3 = if(STC=OGGI_3,1,0) |eval X+4 = if(STC=OGGI_4,1,0) |eval X+5 = if(STC=OGGI_5,1,0) |eval X+6 = if(STC=OGGI_6,1,0) |eval X+7 = if(STC=OGGI_7,1,0) |eval TOTALE=if(STC > OGGI AND STC <= OGGI_7,1,0) |eval TUTTI=if(STC > OGGI ,1,0) |sort - DATE_UPD, LINK |dedup LINK |where STATO IN("LAVORAZIONE", "CONFERMA DATA") |stats sum(X) as X, sum(X+1) as X+1,sum(X+2) as X+2, sum(X+3) as X+3,sum(X+4) as X+4,sum(X+5) as X+5, sum(X+6) as X+6,sum(X+7) as X+7, sum(TOTALE) as TOTALE,sum(TUTTI) as OVER |eval TIPOL ="AMPLIAMENTI" |table TIPOL X X+1 X+2 X+3 X+4 X+5 X+6 X+7 TOTALE OVER |append [ search index =DATI sourcetype = diretta |fields - _* |where TIPOLOGIA IN("SUBNET","VOCE") |eval OGGI=strftime(relative_time(now(),"-0d@d"), "%Y-%m-%d") |eval OGGI_1=strftime(relative_time(now(),"+1d@d"), "%Y-%m-%d") |eval OGGI_2=strftime(relative_time(now(),"+2d@d"), "%Y-%m-%d") |eval OGGI_3=strftime(relative_time(now(),"+3d@d"), "%Y-%m-%d") |eval OGGI_4=strftime(relative_time(now(),"+4d@d"), "%Y-%m-%d") |eval OGGI_5=strftime(relative_time(now(),"+5d@d"), "%Y-%m-%d") |eval OGGI_6=strftime(relative_time(now(),"+6d@d"), "%Y-%m-%d") |eval OGGI_7=strftime(relative_time(now(),"+7d@d"), "%Y-%m-%d") |eval STC=strftime(strptime(DATA_LAVORAZIONE, "%Y-%m-%d"), "%Y-%m-%d") |where STC > OGGI |eval X = if(STC=OGGI,1,0) |eval X+1 = if(STC=OGGI_1,1,0) |eval X+2 = if(STC=OGGI_2,1,0) |eval X+3 = if(STC=OGGI_3,1,0) |eval X+4 = if(STC=OGGI_4,1,0) |eval X+5 = if(STC=OGGI_5,1,0) |eval X+6 = if(STC=OGGI_6,1,0) |eval X+7 = if(STC=OGGI_7,1,0) |eval TOTALE=if(STC > OGGI AND STC <= OGGI_7,1,0) |eval TUTTI=if(STC > OGGI ,1,0) |sort - DATE_UPD, LINK |dedup LINK |where STATO IN("CONFERMA DATA") |stats sum(X) as X, sum(X+1) as X+1,sum(X+2) as X+2, sum(X+3) as X+3,sum(X+4) as X+4,sum(X+5) as X+5, sum(X+6) as X+6,sum(X+7) as X+7, sum(TOTALE) as TOTALE,sum(TUTTI) as OVER |eval TIPOL ="SUBNET - VOCE" | fillnull value=0 TIPOL X X+1 X+2 X+3 X+4 X+5 X+6 X+7 TOTALE OVER |table TIPOL X X+1 X+2 X+3 X+4 X+5 X+6 X+7 TOTALE OVER] . (others APPEND) . . |table TIPOL X X+1 X+2 X+3 X+4 X+5 X+6 X+7 TOTALE OVER   RESULT: TIPOL                                  X    X+1   X+2    X+3 ........ TOTAL   OVER AMPLIAMENTI                0       2       1          0     .......       3            3   DESIRED:  TIPOL                                  X    X+1   X+2    X+3 ........ TOTAL   OVER AMPLIAMENTI                0       2       1          0     .......       3            3 SUBNET - VOCE             0      0        0          0  .........       0            0 TKS
Hello, Good Day! I having the values in the field Data As shown below 2022-05-31 10:18:09   emea   2022-05-31 2022-05-31 10:18:14    apac  2022-05-31 2022-05-31 1... See more...
Hello, Good Day! I having the values in the field Data As shown below 2022-05-31 10:18:09   emea   2022-05-31 2022-05-31 10:18:14    apac  2022-05-31 2022-05-31 10:18:20     us  I want to show the time zone as well like if emea comes after time it should show CST Output should be as follows: 2022-05-31 10:18:09 CST  emea   2022-05-31 2022-05-31 10:18:14 HKT   apac  2022-05-31 2022-05-31 10:18:20  EDT   us  Please help me on this Thank you in Advance Veeru
Hi Spunkers, I have a request by customer never faced before. For one particular Data Model, the Email one, it is required that certaine filed are always populated, even if the logs have this fields... See more...
Hi Spunkers, I have a request by customer never faced before. For one particular Data Model, the Email one, it is required that certaine filed are always populated, even if the logs have this fields empty and/or are not present. So for example it is required that the field subject is always filled; of course, if subject is not present in events, we have to fill it with a token, like the fillnullvalue function does. The particular part is that the customer required that this filling is performed not at search time, with a fillnull command in search, but by the Data Model itself; so, for example, if a log from mail server arrive and it not contain the subject field and/or it is not populated, the DM must fill it with a token value and so, when a search is executed, subject will be already filled with this token. My question is: is this possible to perform?
There are two queries `query 1` will give ID, TIME fields `query 2` will give list of SPECIAL_ID I want to create a table with TIME, ID, IS_SPECIAL_ID IS_SPECIAL_ID is evaluated to true/false... See more...
There are two queries `query 1` will give ID, TIME fields `query 2` will give list of SPECIAL_ID I want to create a table with TIME, ID, IS_SPECIAL_ID IS_SPECIAL_ID is evaluated to true/false based on the condition where is ID is part of the list SPECIAL_ID  
Hi All,   Does Splunk Security Essentials app also map our custom (user defined) correlation searches to different MITRE tactics & techniques ?  Based on what i see,  if we run the setup wizard it... See more...
Hi All,   Does Splunk Security Essentials app also map our custom (user defined) correlation searches to different MITRE tactics & techniques ?  Based on what i see,  if we run the setup wizard it will do so for the pre defined ones that come with ES or with Security Essentials app itself.   There is nothing mentioned about custom correlation searches that one sets up in ES.
Hi guys, I'm using ipinfo to check IPs of my system.       <base search> | stats sum(Download) as Download by DestIP | sort 5 -Size | ipinfo DestIP       The problem is it didn't wait for t... See more...
Hi guys, I'm using ipinfo to check IPs of my system.       <base search> | stats sum(Download) as Download by DestIP | sort 5 -Size | ipinfo DestIP       The problem is it didn't wait for the final result then call the command "ipinfo", it'll make more request than 5 times, depends on how much DestIP it had. Are there any solutions for this case?
Hi all,   i am using React and the Splunk JS SDK to create an manage secrets, which works fine - as long as you stay in JS. The secret is correctly written in passwords.conf. Now I am trying to lis... See more...
Hi all,   i am using React and the Splunk JS SDK to create an manage secrets, which works fine - as long as you stay in JS. The secret is correctly written in passwords.conf. Now I am trying to list the secrets using Python SDK and I can not find the secrets, that got created by the JS SDK. Am I missing anything out? I thought, JS SDK is pretty staight forward when using the builtin StogarePasswords functions and there are not many options to pass parameters to t (realm, username, secret).  Can anyone help?
Hello, I have a group pie chart that shows number of occurrences based on some parameter being in several predefined ranges (group1: 0-20, group2: 20-50, group3: 50-80,..... ) I want to update en... See more...
Hello, I have a group pie chart that shows number of occurrences based on some parameter being in several predefined ranges (group1: 0-20, group2: 20-50, group3: 50-80,..... ) I want to update entire dashboard if some group on this chart is selected and filter only data that have the parameter in the specified range. Thus I need to get 2 tokens with limits of the range that was selected. $click.value seems to be not set properly and things like this: <drilldown> <eval token="BI_groupLow">case(match($click.value$, "less than 20"), 0)</eval> <eval token="BI_groupHigh">case(match($click.value$, "less than 20"), 20)</eval> </drilldown> doesn't seem to work either..... Does anyone have an idea how get range limits in this case? Thanks in advance!
Hi Team, Could you please help me with below issue? I have created a Java custom Business transaction.  I am trying to set the business transaction as "Mark as permanent".  But, the option is alway... See more...
Hi Team, Could you please help me with below issue? I have created a Java custom Business transaction.  I am trying to set the business transaction as "Mark as permanent".  But, the option is always disabled.  Attached below the screenshot.  I have all the admin rights.  I do not understand how to enable the option.  Could you please help me in fixing the issue? Thanks&Regards Srinivas
Hi All, I haven3 events in splunk where there is one unique field in all the three events. Here is the example:   [2022-05-10 23:17:23,049] [INFO ] [] [c.c.n.t.e.i.T.JmsMessageEventData] [] - ... See more...
Hi All, I haven3 events in splunk where there is one unique field in all the three events. Here is the example:   [2022-05-10 23:17:23,049] [INFO ] [] [c.c.n.t.e.i.T.JmsMessageEventData] [] - channel="NPP_MPIR.CHANNEL", productVersion="1.3.1-0-1-404089bc7", uuid="3c78031b-12b3-4694-ab88-3a265bf8499e", eventDateTime="2022-05-10T23:17:23.049Z", severity="INFO", code="JmsMessageEventData", component="mq.listener", category="default", serviceName="Mandated Payment Initiation", eventName="MANDATED_PAYMENT_INITIATION.SERVICE_START", message="Mandated Payment Initiation Event", entityType="MSG", start="1652188643002", messageIdentification="CTBAAUSNXXX20220510020220510131721", queueManagerName="PGT201", queueManagerHostname="10.39.9.38",    Initial: [2022-05-10 23:17:24,425] [INFO ] [] [c.c.n.t.e.i.T.JmsMessageEventData] [] -  eventDateTime="2022-05-10T23:17:24.425Z", severity="INFO", code="JmsMessageEventData", component="submission.sent", category="default", serviceName="Submission Service", eventName="PAYMENT_STATUS_REPORT.SENT", message="Customer initial status report sent to PAG", entityType="INSTR", externalSystem="PAG", start="1652188644418", stop="1652188644425", elapsed="7", exceptionInfo="null", messageIdentification="CTBAAUSNXXX20220510020220510131721", firstMessageTraceIdentification="2TDyn8AlRMud1mfUA49o6A" Final: [2022-05-10 23:17:30,528] [INFO ] [] [c.c.n.t.e.i.T.JmsMessageEventData] [] -  eventDateTime="2022-05-10T23:17:30.528Z", severity="INFO", code="JmsMessageEventData", component="submission.sent", category="default", serviceName="Submission Service", eventName="PAYMENT_STATUS_REPORT.SENT", message="Customer final status report sent to PAG", entityType="INSTR", externalSystem="PAG", start="1652188650520", stop="1652188650528", elapsed="8", exceptionInfo="null", messageIdentification="CTBAAUSNXXX20220510020220510131721", firstMessageTraceIdentification="2TDyn8AlRMud1mfUA49o6A",                         These are the 3 events with unique field "messageIdentification",  I need to combine 1 and 2 events and also 1 and 3 and get difference of time between them and calculate how much percentage of events are triggering in less than 15 sec and 30 sec. I tried using transaction command but not able to fetch ..i think i am using it wrong. Can anyone help me on the same. Thanks in Advance.      
This looks easy but I couldn't figure it out. Any help is appreciated. How to extract user email from raw message and assign to a field? For example, here is my event message message: Specia... See more...
This looks easy but I couldn't figure it out. Any help is appreciated. How to extract user email from raw message and assign to a field? For example, here is my event message message: SpeciaService: Received  Status for xxxxxxx Message=xxx(timeStamp=xxxx, job=1234(super=xxxx(id=1376, userId=xxxxx@xxxx.com , status = success) I want to generate a table with userId and status fields  generated from event logs that matches 'SpeciaService' events I tried below, it didn't work index=xxxx-* SERVICE="xxx-service" | rex field=SpeciaService: Exception "\S* (?<userId>\S*)"  |eval status = if(exception, error:success )| table userId, status