All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

The email alert says ERROR occurred while generating the PDF. Please see pyhton.log for details. As it is older issue unable to locate the logs in splunk. what could be issue here?
Hi Community, I dealt with csv files before, splunk would auto extracted so many fields, shown as figure 1. But today, when I try to search these files again, only fewer fields are displayed... sho... See more...
Hi Community, I dealt with csv files before, splunk would auto extracted so many fields, shown as figure 1. But today, when I try to search these files again, only fewer fields are displayed... shown as figure 2. And the fields I exacted manually also didn't shown... I don't know why... Really need help~~ figure1: Figure 2: Thanks in advance~ BR. Cecilia
Hello, Help me please. I'd like to define multiple search or subsearch to merge all relevant information about alerts. Interesting fields in search are  the hosts - as managed_host field and an u... See more...
Hello, Help me please. I'd like to define multiple search or subsearch to merge all relevant information about alerts. Interesting fields in search are  the hosts - as managed_host field and an uniqe alert number. I do not need alert about all the hosts, so i sort the relevant ones:  index=main ( managed_host="host_A" OR managed_host="host_B" OR managed_host="host_C" ) | dedup alert_num |  eval alert=alert_num Thats simple, will show the relevant alert numbers. After that i need to simple search the selected alerts to get ALL the logs ( some of them doesn't contain managed_host filed, so will not appear at first search.) Index=main alert_num=$alert$ How could be merged this two search in one to generate an alert that will contain all relevant information? Thanks, Gabor    
Can someone please guide me how do i exclude 5th column from a CSV file using props.conf and tranform.conf  Let's assume i have 100 column in my csv file.
My current Splunk regex query 10.66.189.62 -- -- -[17/May/2022:05:59:16--0400]--502- "POST /astra/sliceHTTP/1.1" req_len=1776-req_cont_len=117-req_cont_enc="-"-res_body_len=341 res_len=733 "https://... See more...
My current Splunk regex query 10.66.189.62 -- -- -[17/May/2022:05:59:16--0400]--502- "POST /astra/sliceHTTP/1.1" req_len=1776-req_cont_len=117-req_cont_enc="-"-res_body_len=341 res_len=733 "https://ninepoint.blackrock.com/astra/". "Mozilla/5.0- (Macintosh; Intel-Mac-OS-X-10_15_7) -AppleWebKit/537.36-(KHTML,-Like-Gecko) Chrome/10.0.4896.127 Safari/537.36" x_fw_for="-".req_time=278.326-ups_res_time=278.326 ups_con_time=0.011-ups_status=502-pipe=. -VNDRegID=undefined- gives me; POST /astra/sliceHTTP/1.1   I want to apply another query on the result of above query to get  POST/astra/sliceHTTP/1.1     ,i.e /astra Is there a way or a better regex pattern which can provide me the following?
We configured the EMC Isilon addon on our heavy forwarder, It is throwing the authentication error when we try to connect to any Isilon cluster node.  We are able to connect to same Isilon cluster n... See more...
We configured the EMC Isilon addon on our heavy forwarder, It is throwing the authentication error when we try to connect to any Isilon cluster node.  We are able to connect to same Isilon cluster nodes from web UI with given user and password.     Here are the log errors we are getting   Any help here is really appreciated!!!!!!!!!
we configured the EMC Isilon addon on our heavy forwarder, It is throwing the authentication error when we try to connect to any Isilon cluster node.  We are able to connect to same Isilon cluster n... See more...
we configured the EMC Isilon addon on our heavy forwarder, It is throwing the authentication error when we try to connect to any Isilon cluster node.  We are able to connect to same Isilon cluster nodes from web UI with given user and password.   Here are the log errors we are getting Any help here is really appreciated!!!!!!!!!
Hi All,  I'm very new in Splunk kindly guide. We have one syslog server integrated on UF my question is how to know the capacity of syslog server. Is there any way I could know the total capaci... See more...
Hi All,  I'm very new in Splunk kindly guide. We have one syslog server integrated on UF my question is how to know the capacity of syslog server. Is there any way I could know the total capacity of syslog server.     Thank you in advance!!
Error has occurred to export PDF of dashboard which has cluster map. Unable to render PDF. Exception raised while trying to render "<dashboard-name>" to PDF. Cannot access image at https://127.... See more...
Error has occurred to export PDF of dashboard which has cluster map. Unable to render PDF. Exception raised while trying to render "<dashboard-name>" to PDF. Cannot access image at https://127.0.0.1:8089/services/mbtiles/splunk-tiles/7/113/50?referrer=splunkpdfmaprenderer. Host not included in pdfgen_trusted_hosts in web.conf I specified tile of visualizations as following: https://mt3.google.com/vt/lyrs=m@114&z={z}&x={x}&y={y} Error message has changed Unable to render PDF. Exception raised while trying to render "<dashboard-name>" to PDF. Cannot access image at https://mt3.google.com/vt/lyrs=m@114&z=7&x=113&y=50. Host not included in pdfgen_trusted_hosts in web.conf If I remove Cluster Map from dashboard, I can export PDF. Because I used Splunk Cloud,  I don't know how to modify web.conf. How shoud I solve it?
Hello, For some reason the buttons in any of the dashboard panels under the Search & Reporting App displaying incorrectly. They either are misaligned, look like hyperlinks, or get all squished up. ... See more...
Hello, For some reason the buttons in any of the dashboard panels under the Search & Reporting App displaying incorrectly. They either are misaligned, look like hyperlinks, or get all squished up. Any help is greatly appreciated! FYI: Dashboards themselves work fine in terms of displaying results. See below:   V/r, mello920
Hi, I have a search and a report for the search.  How can I get the date range in the report? 
I would like to change the color of a cell based on the date. If the date is in the future, then green. If the date is today, then yellow. If the date is in the past, then red. I have read many posts... See more...
I would like to change the color of a cell based on the date. If the date is in the future, then green. If the date is today, then yellow. If the date is in the past, then red. I have read many posts about how to do this based on _time and appending a word to the date ("overdue", for example), but I can't seem to make this work in my case. The field I'm working with is dueDate (not based on _time), and it's formatted as %Y-%m-%d. 
Hi, I'm pretty new in splunk, I've been reading a lot of documentation and other questions here, but I don't find the help that I need. I have this search, every day is a left join like this: ... See more...
Hi, I'm pretty new in splunk, I've been reading a lot of documentation and other questions here, but I don't find the help that I need. I have this search, every day is a left join like this:   index=myIndex sourcetype=mySource | eval weekday=strftime(_time,"%A") | where weekday = "Monday" | where Systems= "SYSTEM 1" OR "SYSTEM 2" OR "SYSTEM 3" OR "SYSTEM 4" | eval ExpectedTime = case( System="SYSTEM 1", "6:30am", System="SYSTEM 2", "6:35am", System="SYSTEM 3", "6:45am", System="SYSTEM 4", "6:40am" ) | eval CurrentSLO= case( System="SYSTEM 1", "7:15am", System="SYSTEM 2", "7:20am", System="SYSTEM 3", "7:10am", System="SYSTEM 4", "7:10am" ) | eval EndHour=substr(time, 50, 1) | eval EndMin=substr(time, 52, 2) | eval time = EndHour.":".EndMin | eval Mon = " (" .EndHour. ":" .EndMin. "am)" | eval category="CATEGORY 1" | table category Systems ExpectedTime CurrentSLO Mon Tue Wed Thu Fri | rename ExpectedTime as "Expected Time" | rename CurrentSLO as "Current SLO" | rename category as "Category" | join type=left Systems [ search index=myIndex sourcetype=mySource | eval weekday=strftime(_time,"%A") | where weekday = "Tusday" | where Systems= "SYSTEM 1" OR "SYSTEM 2" OR "SYSTEM 3" OR "SYSTEM 4" | eval ExpectedTime = case( System="SYSTEM 1", "6:30am", System="SYSTEM 2", "6:35am", System="SYSTEM 3", "6:45am", System="SYSTEM 4", "6:40am" ) | eval CurrentSLO= case( System="SYSTEM 1", "7:15am", System="SYSTEM 2", "7:20am", System="SYSTEM 3", "7:10am", System="SYSTEM 4", "7:10am" ) | eval EndHour=substr(time, 50, 1) | eval EndMin=substr(time, 52, 2) | eval time = EndHour.":".EndMin | eval Tue = " (" .EndHour. ":" .EndMin. "am)" | eval category="CATEGORY 1" | table category Systems ExpectedTime CurrentSLO Mon Tue Wed Thu Fri | rename ExpectedTime as "Expected Time" | rename CurrentSLO as "Current SLO" | rename category as "Category" . . .   I need to trigger an alert when there is no information for a day of the week. I've been trying whit search count=0, transaction and other failed solution attempts.
Hello Splunk Team,  I registered on the Splunk Soar community edition page two days ago, but still received no emails about next steps. Please let me know what I have to do to get the process moving... See more...
Hello Splunk Team,  I registered on the Splunk Soar community edition page two days ago, but still received no emails about next steps. Please let me know what I have to do to get the process moving.  Thank you 
I keep getting this error when trying to start splunk, can anyone assist me? I am trying to install splunk within Kali Linux VM   zsh: exec format error: ./splunk    
i am trying to search over REST API, seeing "All Time searches don't adhere to Splunk best practices" Error.  Any policy on Splunk would block REST API searches ? curl -u 'XXXX' -k https://splunkap... See more...
i am trying to search over REST API, seeing "All Time searches don't adhere to Splunk best practices" Error.  Any policy on Splunk would block REST API searches ? curl -u 'XXXX' -k https://splunkapi.example.com/services/search/jobs -d search='search index="webaccess" status=403 earliest_time=-1d' curl -u 'XXXX' -k https://splunkapi.example.com/services/search/jobs -d search='search index="webaccess" status=403 earliest=-1d@d latest=now()'   <?xml version="1.0" encoding="UTF-8"?> <response> <messages> <msg type="FATAL">Please reduce your search to a smaller time range. All Time searches don't adhere to Splunk best practices</msg> </messages> </response>
hello I count events in a single panel from a relative time like below As you can see, I search only events between 7h and 20h 7 days ago    earliest=-7d@d+7h latest=-7d@d+20h   Now, I d... See more...
hello I count events in a single panel from a relative time like below As you can see, I search only events between 7h and 20h 7 days ago    earliest=-7d@d+7h latest=-7d@d+20h   Now, I dont know if it is possible but I would like to add a condition in this relative time because even if  I  use the timepicker, the result count dont change So I would like to count events only for the last 60 minutes during 7h and 20h for the 7 days ago Is it possible? Thanks
We use the Splunk Hadoop Data Roll to move our frozen data over to our Hadoop cluster.  The writing of the data to HDFS seems to work pretty well, but the searching of it through Splunk doesn't work ... See more...
We use the Splunk Hadoop Data Roll to move our frozen data over to our Hadoop cluster.  The writing of the data to HDFS seems to work pretty well, but the searching of it through Splunk doesn't work well at all.  We get lots of different errors from the query not parsing correctly (some problem with how splunk translates the parenthesis) or some mysterious error happens in the MR job on Hadoop. We use Cloudera, and would like to be able to query the data there through Hue/Hive as an alternative to our terrible experience trying to query the hadoop data through Splunk.   Can anyone offer guidance on how to query the 'rolled' data on a Cloudera Hadoop cluster without going through Splunk search?  
Hi All, Can someone please explain what is seekaddress and seekcrc in CRC in simple terms. I tried to check documentation but looks quit confusing. Read the below scenario but Little confused. ... See more...
Hi All, Can someone please explain what is seekaddress and seekcrc in CRC in simple terms. I tried to check documentation but looks quit confusing. Read the below scenario but Little confused. The CRC from the file beginning in the database has no matching record, indicating a file that Splunk hasn’t seen before. Splunk picks it up and ingests its data from the start of the file and updates the database with the new CRCs and Seek Addresses as it ingests the file.
HI I have data that i can't access unless I use regex   but when I run the command that Splunk gives me I get the empty return.   I can use this SPL, but the performance is not go... See more...
HI I have data that i can't access unless I use regex   but when I run the command that Splunk gives me I get the empty return.   I can use this SPL, but the performance is not good. How do I get the attribute to work for this, so I can get the performance gains. Is it the only way I can see the data? what can i do as  the performance is very bad.