All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

I'm attempting to run a query and I've run into a really weird situation where if I run a query with "head 10 | fields *" I'm getting results but if I use "stats" with any field it does not return re... See more...
I'm attempting to run a query and I've run into a really weird situation where if I run a query with "head 10 | fields *" I'm getting results but if I use "stats" with any field it does not return results. For example, this query is returning the results:     index=main sourcetype=o365:management:activity Field1=Value1 | head 10 | fields *       This is returning no results:     index=main sourcetype=o365:management:activity Field1=Value1 | stats count by _time     Somehow this does work and returns the result   index=main sourcetype=o365:management:activity Field1=Value1 | head 10 | stats count by _time   I've looked into it and did not manage to find similar issues, did anyone see anything similar before?
In my ES App, I have a rule where I noted some discrepancy regarding the source country for the src  ip  112.196.162.127. Using 'iplocation'  command in SPL it shows as Turkey. But in whoisdomain... See more...
In my ES App, I have a rule where I noted some discrepancy regarding the source country for the src  ip  112.196.162.127. Using 'iplocation'  command in SPL it shows as Turkey. But in whoisdomaintools it shows as India. 112.196.162.127 IP Address Whois | DomainTools.com Any suggestion why this is the case ?
When I run the script to install EUM (euem-64bit-linux-21.4.3.34447.sh), it showed this notification: .... Setting the configuration properties... Checking EUM MySQL version Please wait as this o... See more...
When I run the script to install EUM (euem-64bit-linux-21.4.3.34447.sh), it showed this notification: .... Setting the configuration properties... Checking EUM MySQL version Please wait as this operation may take some time... Loading class `com.mysql.jdbc.Driver'. This is deprecated. The new driver class is `com.mysql.cj.jdbc.Driver'. The driver is automatically registered via the SPI and manual loading of the driver class is generally unnecessary. Failed to create the EUM user account in the database. Rolling back changes ... Finishing installation ... Please help me to fix this. Can we create account manually?
Hello Splunk Community I am writing a c# .net core API to install the Splunk app. I was able to install the app via postman call successfully. Now, I am automating the same call via c#. The request... See more...
Hello Splunk Community I am writing a c# .net core API to install the Splunk app. I was able to install the app via postman call successfully. Now, I am automating the same call via c#. The request headers generated by Postman and C# API to install the app route match to be exactly the same, however, when I call this route https://docs.splunk.com/Documentation/SplunkCloud/8.2.2201/Config/ManageApps#Install_an_app via my API, I keep getting 403 Forbidden. I know the tokens I am passing are correct, and ACL-Legal-Ack flag is set to Y. What else could be missing that is throwing this error?
Hello, I have events with complex/inconsistence data structure. Need to extract field 2 values under 2 different fields. The regex I wrote is not working for all cases. My regex and sample events are... See more...
Hello, I have events with complex/inconsistence data structure. Need to extract field 2 values under 2 different fields. The regex I wrote is not working for all cases. My regex and sample events are given below. Any help will be appreciated. Thank you.   Regex I wrote: ^\w*\|\w*\|\w*\|\w*\|\w*\|\w*\|\w*\|\w*\|\w*\|\w*\|\w*.\w*.\w*.\w*\|\w*\|(?P<CODE>\d*)\|\w*\|(?P<ERRORMSG>\w*)\| (working only for First and Last events)   Sample events: 4CODEREG|REGT|MEF|IFA|REMOVE||||1234567890|bUnXG_o0PbpgAY2Go6F6jWWh|105.103.110.91|SAAS_BFAF_AUDIT|00|00|||20220419074638|||||<TRANSACTIONDATA><StatusMessage>GTX Key 202210954371398 Removing file: /opt/mef/temp/Attachments/IN//K20220419074627.3410.37570.68836.46248.co1rprdljap1s0l</StatusMessage></TRANSACTIONDATA> wse083affc-1|TESTCASE|GETTRANS|VIEW_TRANS|VIEWPDF||||670018015|aMTmD8BKoyxOkt7U6MuUIl-2|2600:1700:2ed0:f8ws0:7566:140b:f358:6d20|SAAS_BSAF_AUDIT|01||Exception thrown from TDS on pdf or||20220419091342|202012|30|1|0|1;VENF; 446ODEREG|REGT|MEF|IFA|REMOVE||||1234567890|bUnXG_o0PbpgAY2Go6F6jWWh|104.103.110.90|SAAS_BFAF_AUDIT|01|00|Error||20220419074638|||||<TRANSACTIONDATA><StatusMessage>GTX Key 202210954371398 Removing file: /opt/mef/temp/Attachments/IN//K20220419074627.3410.37570.68836.46248.co1rprdljap1s0l</StatusMessage></TRANSACTIONDATA>   NOTE: First event doesn't have any values for ERRORMSG  (High Lights are values)
We have a custom dashboard and whenever we load it I'm getting this error " A custom Javascript error caused an issue loading your dashboard, like due to the dashboard version update. See the develop... See more...
We have a custom dashboard and whenever we load it I'm getting this error " A custom Javascript error caused an issue loading your dashboard, like due to the dashboard version update. See the developer console for more details" We are running Splunk 8.2.5. Has something changed? this was working previously? any idea how I can resolve this ?
Hello how are you? We are having trouble connecting with the CISCO ACI Add-on for Splunk - Configuration Screen (https://splunkbase.splunk.com/app/1897/) with my APIC It throws us the following err... See more...
Hello how are you? We are having trouble connecting with the CISCO ACI Add-on for Splunk - Configuration Screen (https://splunkbase.splunk.com/app/1897/) with my APIC It throws us the following error: "Error: Could not login with provided credentials for APIC aci.blp.com.ar. Error: HTTPSConnectionPool(host='aci.XXXXXX.com', port=443): Max retries exceeded with url: /api/aaaLogin .json (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate (_ssl.c:1106)'))). Message: None" Any ideas? Thanks since now
Has anyone here set an alert in Splunk monitoring of Salesforce that runs a script on alert action that calls back in to the org? I'm just now looking at the possibility of creating some "self healin... See more...
Has anyone here set an alert in Splunk monitoring of Salesforce that runs a script on alert action that calls back in to the org? I'm just now looking at the possibility of creating some "self healing" alerting for a recurring issue we have in SF prod (scheduled batch jobs falling out of queue) and saw the option to run a script in Splunk on alert. Salesforce has an executeanonymous (string apexcode) method through Tooling API exposed in both SOAP and REST. My thought was to have a class built in my SF Prod org that Splunk could just call in to which would handle the logic of finding what's fallen out of spool & kick off the script to put it back in the hopper. 
My HF stopped forwarding events. So far: 1. The splunkd service is running  2. no firewalls enabled 3. Running this command is successful which I think means I'm connecting to the indexers   ... See more...
My HF stopped forwarding events. So far: 1. The splunkd service is running  2. no firewalls enabled 3. Running this command is successful which I think means I'm connecting to the indexers               $ ./bin/splunk cmd openssl s_client -connect inputs1.<stack>.splunkcloud.com:9997 4. Tried restarting the service with no success.  5. the splunkd.log file on the HF is reporting a lot of ERROR TcpInputProc errors   Help! Thank you Any suggestions would be appreciated
Hello all,  I am having trouble with a search that is not returning results as it should. The search is below and I have attached an example of the lookup file. When I run a search just looking for... See more...
Hello all,  I am having trouble with a search that is not returning results as it should. The search is below and I have attached an example of the lookup file. When I run a search just looking for an individual IP it does return events but is not working with the lookup file. Any help is appreciated. index=wineventlog OR index=fortigate | lookup TORIP TORIP AS src_ip OUTPUT TORIP | search TORIP=*  
If I need to increase the number of UBA nodes, is it necessary to change the license?
Hello I am using the Spunk_TA_nix and a server class to push that out to all nix boxes, but server class is not granular enough to select between RHEL 7 and RHEL 8 boxes.    In RHEL 8 I want to m... See more...
Hello I am using the Spunk_TA_nix and a server class to push that out to all nix boxes, but server class is not granular enough to select between RHEL 7 and RHEL 8 boxes.    In RHEL 8 I want to monitor the path /var/log/audit but NOT in RHEL 7.  Is there an inputs.conf stanza to try and accomplish directory monitoring by OS version?  Or how else would one go about this?
Already using a query with below to get total number: | timechart span=1d count What can I add to return, show a "0" if the query is null?
Do we have any Tarrask Malware detection queries for Splunk Enterprise? 
Hi all, I would like to use the SNMP modular input to collect SNMP data from ~100 network switches. SNMP modular input shall be installed at a forwarder server? The polling interval is 10 mins. ... See more...
Hi all, I would like to use the SNMP modular input to collect SNMP data from ~100 network switches. SNMP modular input shall be installed at a forwarder server? The polling interval is 10 mins. Is there any limit on the number of pollings supported? I think I may need to poll ~8000 OIDs in each 10-min polling interval. Is there any CPU/memory loading concern?  
Hi , I have a multisite indexer cluster (3 sites , 2 indexers each, total 6 indexers) .  we have kept -  site_replication_factor = origin:2,total:5  site_search_factor = origin:2,total:4   we ... See more...
Hi , I have a multisite indexer cluster (3 sites , 2 indexers each, total 6 indexers) .  we have kept -  site_replication_factor = origin:2,total:5  site_search_factor = origin:2,total:4   we have this query , if we scale up the indexer cluster and add up more indexers and change the site_replication_factor & site_search_factor accordingly , then what will be the impact on the whole architecture . anything we need to take care of before scaling up the architecture . Let me know .
hi all I am running on a windows heavy forwarder on Splunk Enterprise 8.1.7.2 and I listen to ports tcp 9514 and udp 514. The data comes in to the main index and I perform a transforms/ props t... See more...
hi all I am running on a windows heavy forwarder on Splunk Enterprise 8.1.7.2 and I listen to ports tcp 9514 and udp 514. The data comes in to the main index and I perform a transforms/ props to a other index and the logs go into my indexers and search heads (both search head and indexers are redhat 7.9 splunk enteprise 8.2.0) However in my heavy forwarders i send a copy off to another set of splunk redhat 7.9 heavy forwarders but it seems anything besides the default splunk logs on tcp 9997 does not reach them My config is follows   Inputs.conf [tcp:9514] disabled = false connection_host=ip index =main ##inputs.conf [udp:9514] disabled = false connection_host=ip index =main [udp:514] disabled = false connection_host=ip index =main [tcp:514] disabled = false connection_host=ip index =main     ##transforms.conf [index_redirect_to_pci] REGEX = . DEST_KEY = _MetaData:Index FORMAT = pci ### props.conf [host::x.x.x.x] TRANSFORMS-rt1 = host_rename_rt1,index_redirect_to_pci   How do I get the logs for the 514 and 9514 to be forwarded to the second set of heavy forwarders I have one redhat heavy forwarder that I installed syslog-ng on and change splunk to monitor that folder and remove the listen to port 514 and that's the only splunk heavy forwarder that can send syslog data over to the second set of splunk that is not receiving the logs from the transformed index
Hi All, I'm trying to get my existing addon updated with the latest splunk add-on builder v4.We had developed the existing addon with a previous version of add-on builder , we got a information fro... See more...
Hi All, I'm trying to get my existing addon updated with the latest splunk add-on builder v4.We had developed the existing addon with a previous version of add-on builder , we got a information from the splunk team to rebuild the addon with latest builder. It will be of great help if you can provide me links on how this can be done, or any advise.   Thanks.
To get the percentage increase of threshold value and to build a dashboard out of it to show as red if it is increased by 20%, can someone please suggest
  I need some assistance with the Splunk Cloud migration assessment tool. We plan to move to Splunk Cloud but there are no results for 2 of the preflight check searches but there is data in the ind... See more...
  I need some assistance with the Splunk Cloud migration assessment tool. We plan to move to Splunk Cloud but there are no results for 2 of the preflight check searches but there is data in the index the search pulls from. The searches are: | tstats dc(host) AS hosts where `scma_source_internal_index` source=*license_usage.log TERM(Usage) earliest=-24h@h by index   And   | tstats dc(host) AS hosts where `scma_source_internal_index` sourcetype=splunkd earliest=-4h@h by index   I was reading through the troubleshooting guide and it mentioned that there is a bug where tstats doesn’t work well with reading the internal indexes so it states to reach out to Splunk Support(which I have done but no response yet). The current version of splunk enterprise is 8.2.2.1