All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hello, I have data that look like this : Month Key Value Number ------------------------------ Jan Key1 50 1 Feb Key1 57 2 Mar Key1 51 3 Jan Key2 ... See more...
Hello, I have data that look like this : Month Key Value Number ------------------------------ Jan Key1 50 1 Feb Key1 57 2 Mar Key1 51 3 Jan Key2 101 4 Feb Key2 107 5 Mar Key2 98 6 Jan Key3 701 7 Feb Key3 703 8 Mar Key3 712 9 And I would like it to look like that : Month Key Value Number ------------------------------ Jan Key1 50 1 Feb Key1 57 1 Mar Key1 51 1 Jan Key2 101 2 Feb Key2 107 2 Mar Key2 98 2 Jan Key3 701 3 Feb Key3 703 3 Mar Key3 712 3 Is it possible ? Thanks.
My Customer have a multi-site cluster (site1, site2), and they are considering introducing a new site3. They are considering introducing the SmartStore only to this site3 indexer cluster. We think ... See more...
My Customer have a multi-site cluster (site1, site2), and they are considering introducing a new site3. They are considering introducing the SmartStore only to this site3 indexer cluster. We think that it is necessary to describe the setting of SmartStore in "Local" of the indexer of site3 instead of distribution from the cluster master, because the SmartStore only to site3 indexer cluster. Please tell us about the introduction of SmartStore in a multi-site cluster. Also, RF and SF values must be the same when introducing the SmartStore, we think it is necessary to change the current settings as follows. [Current setting]     # Multi site settings multisite = true available_sites = site1, site2 site_replication_factor = origin:3, site2:2, total:5 site_search_factor = origin:2, site2:1, total:3     [After changing the settings]     # Multi site settings multisite = true available_sites = site1, site2, site3 site_replication_factor = origin:3, site2:2, site3:2, total:7 site_search_factor = origin:2, site2:1, site3:2, total:5     Please tell us anything else we should be careful about these case.
hello   I timechart a lot of search in a table and it works perfectly here is the result But for the piece of code below I try to find a solution in order to be able to calculate a perce... See more...
hello   I timechart a lot of search in a table and it works perfectly here is the result But for the piece of code below I try to find a solution in order to be able to calculate a percentage between sign and eue2 and to timechart the results like above instead having a separate result for sign field and for eue2 result     | appendcols [ search index=toto | timechart span=1h dc(sign) as sign ] | append [ search index=toto | timechart span=1h dc(eue2) as eue2]     I need something like this : | eval perc=(sign/eueu2) | timechart values(p) span=1h  could you help please?
Hi All, I  have logs like below in Splunk: log1:  Valid from: Mon Oct 11 05:12:56 EDT 2021 until: Wed Oct 11 05:12:56 EDT 2023 log2: Serial number: 6900015f06a7454c0728c2744b000000015f06 log3... See more...
Hi All, I  have logs like below in Splunk: log1:  Valid from: Mon Oct 11 05:12:56 EDT 2021 until: Wed Oct 11 05:12:56 EDT 2023 log2: Serial number: 6900015f06a7454c0728c2744b000000015f06 log3: Owner: CN=sd-72m2-rt6w.nam.nsroot.net, OU=166139, O=Citigroup Inc., L=warren, ST=NJ, C=US log4: /apps/gcafews_SG/jboss-eap-7.3/ssl/server.jks log5: /apps/gcafewshlc_SG/jboss-eap-7.3/ssl/server.jks and so on... Aim is to get the validity of each Instance and CN, so created the below query to extract the required fields and to find the validity in days: ..... | rex field=_raw "\/apps\/(?P<Instance>\w+)\/" | rex field=_raw "CN\=(?P<CN>[^\,]+)\," | rex field=_raw "Serial\snumber\:(?P<Serial_Number>[^\,]+)" | rex field=_raw "OU\=(?P<CSI_ID>[^\,]+)\," | rex field=_raw "until\:\s(?P<Valid_Until>\w+\s\w+\s(\s{0,1})\d+\s\d+\:\d+\:\d+\s\w+\s\d+)" | eval From = _time | eval Until = strptime(Valid_Until, "%a %b %d %H:%M:%S %Z %Y") | eval dur=Until-From | eval Validity = round(dur/(60*60*24)) Now to represent all these data in a tabular view I used the query : | table Instance,CN,Serial_Number,CSI_ID,Valid_Until,Validity But it gave me the table in the below manner: Instance CN Serial_Number CSI_ID Valid_Until Validity         Wed Oct 11 05:12:56 EDT 2023 556     6900015f06a7454c0728c2744b000000015f06         sd-72m2-rt6w.nam.nsroot.net   166139     gcafews_SG           gcafewshlc_SG           The requirement is to create table with the values in single row as below: Instance CN Serial_Number CSI_ID Valid_Until Validity gcafews_SG sd-72m2-rt6w.nam.nsroot.net 6900015f06a7454c0728c2744b000000015f06  166139 Wed Oct 11 05:12:56 EDT 2023 556 gcafewshlc_SG sd-72m2-rt6w.nam.nsroot.net 6900015f06a7454c0728c2744b000000015f06  166139 Wed Oct 11 05:12:56 EDT 2023 556 Please help modify the query to get the table in the desired manner.
I create a splunk enterprise setup in a aws machine . I can access it via http://ipv4_address_by_aws:8000 now i want to send zeek index data into elastic . Now in elasticsearch it ask for URL o... See more...
I create a splunk enterprise setup in a aws machine . I can access it via http://ipv4_address_by_aws:8000 now i want to send zeek index data into elastic . Now in elasticsearch it ask for URL of Splunk enterprise server , which I hope is   http://ipv4_address_by_aws:8000  It asks for REST API username and password which I hope will be as splunk username and password i used during installation. I can see data in splunk search using this command : index="zeek" source="/opt/zeek/logs/current/dns.log"   but this is not present in elastic after i save all these setting , I get 404 error in almost all logs   how to connect splunk to elastic , also this rest url , username,password is to be filled as i have defined above or any other setting
 We want to get the number of successful login, multiple successful login, multi-fail logins and also number the of hqid which has not logged in i.e (total number of hqid - sum(successful login + mul... See more...
 We want to get the number of successful login, multiple successful login, multi-fail logins and also number the of hqid which has not logged in i.e (total number of hqid - sum(successful login + multiple successful login + multi fail). We have written below query, and we are able to get the number of successful login, multi-success login and as well multi-fail but I am not sure how to get the number for not logged-in case. Could anyone please help me here     base_search query | eval hqid = substr(requestURI,23,10) | table hqid httpStatus | eval status-success=if(httpStatus="200",1,0) | eval status-fail= if(httpStatus != "200",1,0) | stats sum(status-success) as status-success, sum(status-fail) as status-fail by hqid | eval status = case(('status-fail'=0 AND 'status-success'>0), "successful-logins", ('status-fail'>0 AND 'status-success'>0), "multi-success", ('status-fail'>0 AND 'status-success'=0), "multi-fail", ('status-fail'>0), "fail",1=1, "Other"
Hi everyone, I can't login to my Splunk account because I have a space at the beginning of my password. We will login to Splunk via LDAP. Does Splunk have a problem with that or is that a Bug? Th... See more...
Hi everyone, I can't login to my Splunk account because I have a space at the beginning of my password. We will login to Splunk via LDAP. Does Splunk have a problem with that or is that a Bug? Thank you very much for any advice.
Splunk UF is not sending logs to Splunk. The Splunkd constitutes full of errors and warnings as below. The telnet connection to DS and Indexers is successful at 8089 and 9997 respectively. It is a w... See more...
Splunk UF is not sending logs to Splunk. The Splunkd constitutes full of errors and warnings as below. The telnet connection to DS and Indexers is successful at 8089 and 9997 respectively. It is a windows server and service is up and running ERROR TcpOutputFd - Read error. An existing connection was forcibly closed by the remote host. WARN TcpOutputProc - Applying quarantine to ip=**888* port=9997 _numberOfFailures=2 03-28-2022 04:50:44.070 +1100 ERROR TcpOutputFd - Read error. An existing connection was forcibly closed by the remote host. 03-28-2022 04:50:44.070 +1100 WARN TcpOutputProc - Applying quarantine to ip=*8888* port=9997 _numberOfFailures=2    
Is it possible to search base on the Timestamp from the Column than the _time of ingestion I'm using dB connect not the "add Data" Since ill be using this in Dashboard,  I'm Very new in splunk ... See more...
Is it possible to search base on the Timestamp from the Column than the _time of ingestion I'm using dB connect not the "add Data" Since ill be using this in Dashboard,  I'm Very new in splunk  
Hi, we currently have one of our on-call schedules to be office hours only (Weekdays 9-5). However, we are noticing that we don't get notified about alerts that get raised over the weekend. Our expec... See more...
Hi, we currently have one of our on-call schedules to be office hours only (Weekdays 9-5). However, we are noticing that we don't get notified about alerts that get raised over the weekend. Our expectation was that with these alerts, because no one is there to acknowledge them, they will still be there when someone is eventually on the roster at 9am Monday but apparently that is not the case. (The alert is in the list of alerts, but it doesn't page anyone).  Is there a way to ensure that the person that gets rostered on at 9am Monday will be notified of any alerts that were triggered over the preceding weekend (period where no one was on-call)?  Thanks
Hello I would like to know if its possible to reuse the result of the field Total in another search? | stats dc(titi) as Total Thanks 
i want to trigger dashboard as PDF to my mail id.....But while scheduling PDF delivery am getting error like this: Can any one tell me why i am facing this error and how can i avoid this and t... See more...
i want to trigger dashboard as PDF to my mail id.....But while scheduling PDF delivery am getting error like this: Can any one tell me why i am facing this error and how can i avoid this and trigger mail . When i am previewing the data..it looks fine. Please help me out Thanks in Advance.
Hi, I understand that importing the evtx format into Splunk consumes more licenses than the volume displayed. (Because evtx is a compressed format.) Am I right in thinking that I will consume abo... See more...
Hi, I understand that importing the evtx format into Splunk consumes more licenses than the volume displayed. (Because evtx is a compressed format.) Am I right in thinking that I will consume about 2 to 5 times more licenses? I think I saw the material about this somewhere, can anyone share it? I would be grateful if you could help me.
  How we can extract Windows Event description instead of Raw data which only give info of Event ID..Is it possible to extract exact event info..
I have an event which contains error reason  codes of failed records . I have to extract these reason codes and get a count of each of these reason codes.
Hi Gurus, I am trying to extract data from log message using rex field=_raw. The regex I have is  "Event <(?<eventNo>.*)>, Super <(?<super>.*)>, Charge <(?<oic>.*)>, number <(?<pcn>.*)>, Card <(?... See more...
Hi Gurus, I am trying to extract data from log message using rex field=_raw. The regex I have is  "Event <(?<eventNo>.*)>, Super <(?<super>.*)>, Charge <(?<oic>.*)>, number <(?<pcn>.*)>, Card <(?<cn>.*)>, CO <(?<co>.*)>, Warn <(?<warn>.*)>" | table _time oic eventNo pcn cn super co warn and I am able to extract records. but the issue is may or may bot be present is the log and I still need to extract the rest of the data. I tried  "Event <(?<eventNo>.*)>, Super <(?<super>.*)>, Charge <(?<oic>.*)>, number <(?<pcn>.*)>, Card <(?<cn>.*)>, (CO <(?<co>.*)>,)? Warn <(?<warn>.*)>" | table _time oic eventNo pcn cn super co warn It gives me the records which does nto contain this item. I want to extract all the records irrestive of whether it is present or not present. Please let me know what am I doing wrong. Thanks a lot in advance.  
I have a piece of code as -  | rex field=$AppNC$ ".*\/(?<ChosenAppCode>.*" | search job_name=* U_APP_CODE=ChosenAppCode  From the drop down the AppNC (App Name Code) is chosen and the search should... See more...
I have a piece of code as -  | rex field=$AppNC$ ".*\/(?<ChosenAppCode>.*" | search job_name=* U_APP_CODE=ChosenAppCode  From the drop down the AppNC (App Name Code) is chosen and the search should have the app code part. How can the following be dynamic ? U_APP_CODE=ChosenAppCode Meaning, ChosenAppCode, would be the code extracted in the line above? 
Hi, Is there a way in ITSI to monitor web sites , i.e. : www.mywbsite.com , www.google.com , any given weburl Monitoring their http response , latency , availability . Regards
I'm kinda lost here. I'm trying to test something on my Splunk Free at home using receivers/simple endpoint and all I'm getting is 404. The "normal" HEC endpoints work OK. $ curl "http://172.16... See more...
I'm kinda lost here. I'm trying to test something on my Splunk Free at home using receivers/simple endpoint and all I'm getting is 404. The "normal" HEC endpoints work OK. $ curl "http://172.16.0.3:8088/services/receivers/simple?source=www&sourcetype=web_event" -d "aaaaaaaaaaaaaa" {"text":"The requested URL was not found on this server.","code":404} It's the example almost literarily copied from REST API docs. And I'm getting 404. Where to look for diagnostic info?
Hi Is it possible to filter specific field values in indexers without HeavyForwarder in indexer cluster ?