All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hello! I'm trying to pull in full product names into a table, but only the first word is getting pulled in.  The field name is Product. Example products are: Cash product Cash connections ... See more...
Hello! I'm trying to pull in full product names into a table, but only the first word is getting pulled in.  The field name is Product. Example products are: Cash product Cash connections Checking app Checking cash product When I create the table, I only see "Cash" or "Checking" as the product names instead of the full name. I can't figure out how to do a rex command to help solve this. (Or some other way to solve for it.) Maybe something like this? I'm just guessing.    "(Cash|Checking)\s[a-z]\w*"   Appreciate any help!  
Do use the following extension https://developer.cisco.com/codeexchange/github/repo/Appdynamics/url-monitoring-extension where I monitor URL. Custom metric gives a status of either 0, 2,3 4 UNKNOWN(... See more...
Do use the following extension https://developer.cisco.com/codeexchange/github/repo/Appdynamics/url-monitoring-extension where I monitor URL. Custom metric gives a status of either 0, 2,3 4 UNKNOWN(0) FAILED(2) ERROR(3) SUCCESS(4) But using other than a timegraph does not give me the information because it is important to know the percentage of when is 0, 1,2,3 (DOWN) or 4 (UP) So Timegraph shows me when someting is down, but i want also to add this custom metric to a expression like: percentage of 0,2 & 3 (DOWN)    and percentage of 4 (UP) and show this in a pie or gauge or metric value . For me this above does not seems to work with the calculation (how many percentage over time are 0-3 and how much is 4 in percentage) Minimum: Minimum value, only available for averaged metrics Maximum: Maximum value, only available for averaged metrics Value: Contains the average or the sum across the time range depending on the metric Sum: Aggregated value of the metric over the time range Count: A count of the observed values over the time range Current: The sum of the most recent minute's metric data value across all the included nodes Secondly is it possible to put this custom metric into Analytics ? and therefor make better calculation possibilities
I have a big event and I want to capture the string between "Message=" and "UpDocCaseRepository" in other words i want to capture this specific string-- "Service encountered a database error." ... See more...
I have a big event and I want to capture the string between "Message=" and "UpDocCaseRepository" in other words i want to capture this specific string-- "Service encountered a database error." InnerMessage="Method Name: LOBCaseService.LoadCaseText, Error Message: Service encountered a database error., Exception: System.Net.Http.HttpRequestException: Cannot get client case document(s). Lob service call was not successful. reasonPhrase=Unauthorized\r\n at .eCAC.Service.CDR._1.Repository. event- 2022-04-04 21:15:37,734 ERROR WCFServiceClient.Web.InfrastructureService sTime="4/5/2022 1:15:37 AM" LocalId="403654042" Method="LoadCase" Message="Service encountered a database error." InnerMessage="Method Name: LOBCaseService.LoadCaseText, Error Message: Service encountered a database error., Exception: System.Net.Http.HttpRequestException: Cannot get client case document(s). Lob service call was not successful. reasonPhrase=Unauthorized\r\n at .eCAC.Service.CDR._1.Repository.UpDocCaseRepository.<SendUpDocRequest>d__14`1.MoveNext() in s:\jenkins\workspace\_ecac_se---aeddb52c\.eCAC.Service.CDR\1.Repository\UpDocCaseRepository.cs:line 191\r\n--- End of stack trace from previous location where exception was thrown
I'm trying to make a time chart where it uses the time value specified in my table.  Rather than the default _time value. Currently I'm trying something like this: base search |eval Fail... See more...
I'm trying to make a time chart where it uses the time value specified in my table.  Rather than the default _time value. Currently I'm trying something like this: base search |eval Failures = if(STATUS ="Failed",1,0) | timechart sum(Failures) by TIME DATE TIME  SYSTEM Failures 03/01/2022 12:00 Development 10 03/01/2022 13:00 Development 2 04/01/2022 15:00 Development 3 05/01/2022 18:00 Development 8    Any suggestions help :-).   Thank you, Marco
Hello, I had  PagerDuty App for Splunk | Splunkbase installed on our instance of Splunk and when I went to the setup page and put the API and integration url in and it confirm nothing happened. Whe... See more...
Hello, I had  PagerDuty App for Splunk | Splunkbase installed on our instance of Splunk and when I went to the setup page and put the API and integration url in and it confirm nothing happened. When I checked on the browser console I saw there were two 404 (not found) errors.   splunkd/__raw/services/properties/alert_actions/pagerduty/param.integration_key?output_mode=json&_=23232443242   When I tried clicking confirm I receive another 404 error.   There there's no alerts_actions.conf in the pagerduty local folder and there is one in default I checked the security rights and they all seem fine.  I tried making a local dev instance to see if I could break the permissions and replicate the error but it worked fine everytime and created a alerts_actions.conf in the pagerduty app local folder.   If anyone knows a solution to this problem I'd greatly appreciate the help.  My current theory from the initial 404 error and URL chunk I included, is it keeps looking for the alerts_actions.conf in the local folder.  So if I manually created it with the proper stanza and fields that might let me setup PagerDuty.  As to why it's not actually creating it I'm not sure since the permissions all look good. thanks
I generated a Diag and now i need to creat an index for it. how do i create it ?    
Hi. How I can compare load during the same time every day for business days? I.e. time 11:oo AM - 7:00 PM on Monday, Tuesday -----, Friday ----------------- Monday - 3200 Tuesday  - 3300 ... See more...
Hi. How I can compare load during the same time every day for business days? I.e. time 11:oo AM - 7:00 PM on Monday, Tuesday -----, Friday ----------------- Monday - 3200 Tuesday  - 3300 Wednesday - 5400 Thursday - 3200 Friday - 3100 -------------------- TIA
We are having a connection issue on Splunk Enterprise 8.2.6 on prem with Splunk Secure Gateway 2.7.4, according to the firewall rules the connection port 443 outbound to the host prod.spacebridge.spl... See more...
We are having a connection issue on Splunk Enterprise 8.2.6 on prem with Splunk Secure Gateway 2.7.4, according to the firewall rules the connection port 443 outbound to the host prod.spacebridge.spl.mobi is allowed. We verified the connection using the troubleshooting guide in the documentation by running: curl https://prod.spacebridge.spl.mobi/health_check Also we tried the test for wss connection and we get the correct response: curl -i -N -H "Connection: Upgrade" -H "Upgrade: websocket" -H "Host: echo.websocket.events" -H "Origin: https://echo.websocket.events" -H "Sec-WebSocket-Key: d3d3LnNwbHVuay5jb20=" -H "Sec-WebSocket-Version: 13" https://echo.websocket.events When we run the following rest command:   | rest "services/ssg/test_websocket" request_type="{\"versionGetRequest\": {}}" request_mode=clientSingleRequest     We get this output:   auth_code_status = 200 completed_client_registration = 0 error = 'token_id' server_registration_status = 400 splunk_server = server wss_response = 0   The error traceback in _internal is:   2022-05-09 11:22:58,148 ERROR [rest_base] [__init__] [exception] [4772] Spacebridge error Traceback (most recent call last): File "/opt/splunk/etc/apps/splunk_secure_gateway/bin/spacebridgeapp/rest/util/helper.py", line 13, in extract_parameter result = obj[key] KeyError: 'self_register' During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/opt/splunk/etc/apps/splunk_secure_gateway/bin/spacebridgeapp/rest/base_endpoint.py", line 53, in handle res = self.handle_request(request) File "/opt/splunk/etc/apps/splunk_secure_gateway/bin/spacebridgeapp/rest/base_endpoint.py", line 86, in handle_request return self.post(request) File "/opt/splunk/etc/apps/splunk_secure_gateway/bin/spacebridgeapp/rest/registration/saml_registration_handler.py", line 70, in post self_register = extract_parameter(request['query'], SELF_REGISTER_LABEL, QUERY_LABEL) File "/opt/splunk/etc/apps/splunk_secure_gateway/bin/spacebridgeapp/rest/util/helper.py", line 15, in extract_parameter raise Errors.SpacebridgeRestError('Error: Request requires %s parameter "%s"' % (source_name, key), 400) spacebridgeapp.rest.util.errors.SpacebridgeRestError: Error: Request requires query parameter "self_register"   Any ideas on how to solve this issue? or continue the troubleshooting?
hello I timechart events without a by clause     | timechart count(crash) as "crash" count(hang) as "hang"     When I click on "cras" or "hang" I need to open a drilldown not in another... See more...
hello I timechart events without a by clause     | timechart count(crash) as "crash" count(hang) as "hang"     When I click on "cras" or "hang" I need to open a drilldown not in another dashboard but with ajust in a new window I trie with a token or with a link to the search but it doesnt works Could you help please?
Hi I need to create an alert for when the VPN goes down but only when the drop lasts more than 1 minute. I would appreciate your help   Right now I have the alert set to report any down event... See more...
Hi I need to create an alert for when the VPN goes down but only when the drop lasts more than 1 minute. I would appreciate your help   Right now I have the alert set to report any down events and then manually check which ones last longer than 1 minute. index=paloalto |search EventID=tunnel-status-down OR EventID=tunnel-status-up
Hi,   In one of my graphs I try to fixate the areacolors to red and green. However, I can't figure out how. Tried this:       "visualizations": { "viz_CgGpI6E0": { "type": "splunk.area"... See more...
Hi,   In one of my graphs I try to fixate the areacolors to red and green. However, I can't figure out how. Tried this:       "visualizations": { "viz_CgGpI6E0": { "type": "splunk.area", "dataSources": { "primary": "ds_aNB3d69r_ds_d4nLznpt" }, "title": "Nanoservice request results", "options": { "stackMode": "stacked100" }, "fieldColors": { "OKPerc": "#42663a", "ErrorPerc": "#7a1709" }, "showProgressBar": false, "showLastUpdated": false }, "viz_r9Pd57Q4": { "type": "splunk.markdown", "options": { "markdown": "" } } },   Also tried placing them inside the "Options" object. "visualizations": { "viz_CgGpI6E0": { "type": "splunk.area", "dataSources": { "primary": "ds_aNB3d69r_ds_d4nLznpt" }, "title": "Nanoservice request results", "options": { "stackMode": "stacked100", "fieldColors": { "OKPerc": "#42663a", "ErrorPerc": "#7a1709" } }, "showProgressBar": false, "showLastUpdated": false }, },   But the colors stay wrong. Am I doing it wrong? Current graph:  Purple should be green and blue should be red. Cheers,
We have transitioned from ServiceNow calendaring for on-call to Splunk On-Call. Our users are used to getting an email the week before they go on-call and then again as they're entering their on-call... See more...
We have transitioned from ServiceNow calendaring for on-call to Splunk On-Call. Our users are used to getting an email the week before they go on-call and then again as they're entering their on-call week. Is there a way to notify people when it's their on-call week?
Hi all, I have a table and I need to highlight the values that are greater than lets say 5 in a line graph. how to select only those specific values into search  
Hi, I am running below query and expecting count of failureCount, warningCount in table as total count (1 row only), however it's not returning anything, Where I am going wrong?   index="deng03-c... See more...
Hi, I am running below query and expecting count of failureCount, warningCount in table as total count (1 row only), however it's not returning anything, Where I am going wrong?   index="deng03-cis-dev-audit" | spath PATH=data.labels.verbose_message output=verbose_message | search "data.labels.activity_type_name"="ViolationOpenEventv1" | where (verbose_message like "%Oldest unacked message age%evt%" or verbose_message like "%Oldest unacked message age%rec%") | eval error=case(like(verbose_message,"%above the threshold of 1800.000%"), "warning", like(verbose_message,"%above the threshold of 300.000%"), "failure") | eval failureCount count by error="failure" | eval warningCount count by error="warning" | table failureCount, warningCount
Hello everyone,  I am trying to separate data getting into the main index from particular hosts. I am trying  Transforms.conf [windows_ot] DEST_KEY = _metadata_index Regex = HOst123 Format = h... See more...
Hello everyone,  I am trying to separate data getting into the main index from particular hosts. I am trying  Transforms.conf [windows_ot] DEST_KEY = _metadata_index Regex = HOst123 Format = host_wineventlog Source_key = Metadata:Host Props.conf [wineventlog] Transforms-setindex = windows_ot Do we have another way to separate 26 host's data ( without accessing the host machines )  The following data flow level 2 (Heavyforwarder) sending data to ---> level 3 (heavy forwarder) ---> main HF Is it a way to separate data in the main HF ?? also is trans conf correct ?? 
Hello, I am looking for a help here, this is a very weird issue that I am facing. I have a requirement to monitor Event ID 4624 and 4625 from a specific set (10) of servers. I have used following i... See more...
Hello, I am looking for a help here, this is a very weird issue that I am facing. I have a requirement to monitor Event ID 4624 and 4625 from a specific set (10) of servers. I have used following inputs.conf, but instead of receiving these specific events data, i am receiving some other event codes such 4670, 4719, 4742, 4738 etc. I have tried almost all possible ways, but unable to understand what's really happening here. [WinEventLog://Security] disabled = 0 start_from = oldest current_only = 0 # only index events with these event IDs. whitelist = 4624, 4625 index = wineventlog sourcetype = xyz renderXml=false
folder1 we have multiple file f1,f2,f3,f4  need to configure all files for different sourcetype below is the query which we have created but did not worked [batch://<path_of the file>] index=i1 ... See more...
folder1 we have multiple file f1,f2,f3,f4  need to configure all files for different sourcetype below is the query which we have created but did not worked [batch://<path_of the file>] index=i1 sourcetype=s1 whitelist = f1 move_policy=sinkhole   [batch://<<path of the file>>] index=i1 sourcetype=s2 whitelist = f2 move_policy=sinkhole
Hi all, I have a line chart with few fields and a threshold field. I wanted to highlight the data points that are above the threshold line is it possible to do so in dashboard studio? 
Hi,   I receive data from a particular product that is installed on various customers, that data is received every 5 minutes, from the jason there is a field named tname and what i am interested ... See more...
Hi,   I receive data from a particular product that is installed on various customers, that data is received every 5 minutes, from the jason there is a field named tname and what i am interested in is for every customer (lets say custoerName is the field) check what tname's we received in the last five minutes and compare to the .csv lookup file. I am only interested to show what is present from the returned data that is not present in the .csv.   I hope the above helps?   Thanks
We are using java instrumentation for our applications running on the Kubernetes cluster. The applications are running with a normal user "appuser" , where appd agent is showing an error. MultiT... See more...
We are using java instrumentation for our applications running on the Kubernetes cluster. The applications are running with a normal user "appuser" , where appd agent is showing an error. MultiTenantAgent Dynamic Service error - could not open Dynamic Service Log /opt/appdynamics-java/ver22.4.0.33722/logs/fixeddeposit-service-cb865796d-jp29w/argentoDynamicService_05-09-2022-05.10.44.log      Running as user appuser      Cannot write to parent folder /opt/appdynamics-java/ver22.4.0.33722/logs/fixeddeposit-service-cb865796d-jp29w      Could NOT get owner for MultiTenantAgent Dynamic Services Folder      Likely due to fact that owner (null) is not same user as the runtime user (appuser)      which means you will need to give group write access using this command:  find external-services/argentoDynamicService  -type d -exec chmod g+w {}      Possibly due to lack of permissions or file access to folder: Exists: false, CanRead: false, CanWrite: false      Possibly due to lack of permissions or file access to log: Exists: false, CanRead: false, CanWrite: false      Possibly due to java.security.Manager set - null      Possibly due to missed agent-runtime-dir in Controller-XML and will need the property set to correct this...      Call Stack: java.io.FileNotFoundException: /opt/appdynamics-java/ver22.4.0.33722/logs/fixeddeposit-service-cb865796d-jp29w/argentoDynamicService_05-09-2022-05.10.44.log (No such file or directory) can anyone help me here?