All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi everyone, Just wanted to know how to show alert dynamically like we use  dashboard panel to search query for every drop-down option likewise is it possible to show how many alerts are occured with... See more...
Hi everyone, Just wanted to know how to show alert dynamically like we use  dashboard panel to search query for every drop-down option likewise is it possible to show how many alerts are occured with in that period  for that drop down option in dashboard panel? Please help me out with this thing.
Hello we are starting to use on call and i am attempting to integrate with zabbix 4.0 except we use a proxy and i am unable to find a way to use such a proxy to send alerts is there any way t... See more...
Hello we are starting to use on call and i am attempting to integrate with zabbix 4.0 except we use a proxy and i am unable to find a way to use such a proxy to send alerts is there any way to use a proxy with the plugin in 4.0 ? i have read that its possible with 5x but we are unable to upgrade
I have created a lookup in the LOOKUP folder placed in local. Post that I defined the lookup in transforms.conf. This is the stanza defined in transforms.conf   [lookup_name] filename = lookup... See more...
I have created a lookup in the LOOKUP folder placed in local. Post that I defined the lookup in transforms.conf. This is the stanza defined in transforms.conf   [lookup_name] filename = lookup_name.csv   All the changes are pushed to dev repository in git but when I am trying to search the lookup in search head, I am unable to find the same. Is there any additional step that I am missing out on?
We are currently using a Splunk Enterprise environment with one search head and one indexer. We enabled data model acceleration because the performance of the search became poor as we used the syste... See more...
We are currently using a Splunk Enterprise environment with one search head and one indexer. We enabled data model acceleration because the performance of the search became poor as we used the system. We are planning to increase the number of search heads by one in order to accommodate more users in the future. Will the data model acceleration enabled for the first search head automatically be enabled for the next search head? I do not believe that any additional configuration is necessary, especially since the .tsdix file is configured in the indexer, not in the search head. If there are any settings required to enable data model acceleration for additional search heads, please let me know.
hi everyone,    i have some doubts in indexer clustering   how to stop data replication ?   please provide splunk documentation. 
Hi All, One of our Cyber security person facing a strange issue while trying to access the data from the Splunk search portal. Initial level of troubleshooting the issue we found that Roles/Permis... See more...
Hi All, One of our Cyber security person facing a strange issue while trying to access the data from the Splunk search portal. Initial level of troubleshooting the issue we found that Roles/Permission are not syncing but later we found that Roles/Permission are auto changing frequently. We could not find any ERROR/WARN in the splunkd.log, so not sure how to troubleshoot this issue Splunk version : 8.2  OS: Linux  Authentication mode: LDAP  Environment: Splunk distributed Production Environment.  Problem statement:  Roles/Permission are not syncing properly its getting auto changed frequently.  Kindly let me know what are steps we should follow to troubleshoot this type of issue.
Hi, Is there any way to install the AppDynamics Agent into the Kubernetes in order to monitor the .NET applications and without modifying the app code in order to communicate with the agent? The k8... See more...
Hi, Is there any way to install the AppDynamics Agent into the Kubernetes in order to monitor the .NET applications and without modifying the app code in order to communicate with the agent? The k8s cluster is installed on linux OS and on-premise Thank you
hi I stats events like this But my distinct count is wrong because some events have the same site How to agregate Pb1, Pb2 and Pb3 separatively by site and to have the sum of the site please? ... See more...
hi I stats events like this But my distinct count is wrong because some events have the same site How to agregate Pb1, Pb2 and Pb3 separatively by site and to have the sum of the site please?     | stats count(eval(cit >= 40)) as Pb1, count(eval(cit2 >= 15)) as Pb2, count(eval(cit3 >= 20)) as Pb3 by site | eval Total=Pb1 + Pb2 + Pb3 | search Total > 10 | stats dc(site)        
Hi Splunkers I have 50 dashboards with each dashboard having disk metric panel, Process details, Autosys Job status, Memory Usage details, and Key word monitoring panels. Each dashboard is mapped wi... See more...
Hi Splunkers I have 50 dashboards with each dashboard having disk metric panel, Process details, Autosys Job status, Memory Usage details, and Key word monitoring panels. Each dashboard is mapped with a 3 letter appcode. Now I want to have a master dashboard to represent status of all this 50 dashboards in a single place.  If in dashboard-1 for appcode GHI my disk panel or any other panel has a critical warning(Red Colour) the GHI appcode in my master dashboard has to turn Critical(Red Colour) as well. Similar with other panels and other dashboards.   My Master dashboard should look something like this for the appcode status    
Hi Splunkers, I'm performing some searches to monitor Windows user failure attempts. The failure itself is not a problem, I know the proper windows event code to monitor failures attempts; the foc... See more...
Hi Splunkers, I'm performing some searches to monitor Windows user failure attempts. The failure itself is not a problem, I know the proper windows event code to monitor failures attempts; the focal point is that in every of this try I have to add a particular condition to check. Between these searches, two makes me some difficults: I have to monitor login failures performed by an expired account, while in another one I have to track attempts by disabled account. In my scenario, where I have the Windows addon installed on my environment, how can I track the 2 above scenarios?
Hello We are testing Splunk cloud. After installing Splunk App for Unix and Linux I got messages asking to reboot. my console https://prd-p-3qf39.splunkcloud.com Thank you    
Hi Everyone, I am trying to pull a result per customer, where he/she has visited url based on time_order I did something like this , I got the result but it is in alphabetical order what I am loo... See more...
Hi Everyone, I am trying to pull a result per customer, where he/she has visited url based on time_order I did something like this , I got the result but it is in alphabetical order what I am looking is time_order my_search | transaction user_id startswith=http_uri="/" endswith=http_uri="random.html" | table user_id http_uri Also is there any other way other than transaction,I am not sure. please guide on how this can be achieved. thank you.
How do i enable Splunk App for AWS with Detailed billing report with resources and tags ? i want to automate this to monthly basis. please tell me step by step procedure.
In our enterprise, there is already another team which has setup Splunk Search Heads and Indexers in their own AWS account (say A). We are planning to index and store new data in our AWS account (sa... See more...
In our enterprise, there is already another team which has setup Splunk Search Heads and Indexers in their own AWS account (say A). We are planning to index and store new data in our AWS account (say B). For our dashboards, we would like to pull in data indexed in Account A as well. So, trying to determine the best approach here 1. Is is possible to setup Search Heads in Account B and add indexers to it from account B and A as well ? 1.1. In such case, will existing setup in Account A get affected any way? Overall, is it possible to share indexers across multiple AWS accounts and still maintain its own Search Heads and dashboard UI ? As we are different teams, we would like to have independence in maintaining our dashboards/splunk enterprise instances and also not share indexed confidential data.  The documentation here lists command to edit indexer cluster config but not add a new search head from other aws account. So, it would be helpful to know if its possible to share indexes across aws accounts. https://docs.splunk.com/Documentation/Splunk/8.2.5/DistSearch/SHCandindexercluster  
hi In my dashboard, I use 2 similar searches in the first, I am doing a dc of  "s"     index=test earliest=@d+7h latest=@d+19h | search rtt >= 150 | stats count as Pb by s | search Pb >= 5 ... See more...
hi In my dashboard, I use 2 similar searches in the first, I am doing a dc of  "s"     index=test earliest=@d+7h latest=@d+19h | search rtt >= 150 | stats count as Pb by s | search Pb >= 5 | stats dc(s)     the result is 12  in the second search, i use the same search but I need to gather events also by "s" and also _time     index=test type=* earliest=@d+7h latest=@d+19h | bin span=1h _time | search rtt >= 150 | stats count as Pb by s _time | search Pb >= 5 | timechart dc(s) as sam span=1h | where _time < now() | eval time = strftime(_time, "%H:%M") | stats sum(s) as nbs by time | rename time as Heure     the pb I have is that the results is not equal to 12 but to 6 Why I can retrieve the same resulst that in the first search please?
Hi Team, We notice that the page below is no longer available. https://www.splunk.com/en_us/product-security/announcements-archive.html   Can you share with us the new link?
Hi everyone, I'm on Victoria experience and want to perform a self-installation of the following app: Microsoft Sentinel Add-On for Splunk. However, I cannot see the app in the list for self-installa... See more...
Hi everyone, I'm on Victoria experience and want to perform a self-installation of the following app: Microsoft Sentinel Add-On for Splunk. However, I cannot see the app in the list for self-installation. How can I get this installed?
Can someone, please explain to me what expires does when setting up an alert. I can not find an explanation in the manuals, I search.  
Dears I have installed  splunk UF V8.1.3 on Solaris sparc server V11.5.we are not getting any log from those servers apart from _internal logs. we did below checks. 1.connection fine- telnet hap... See more...
Dears I have installed  splunk UF V8.1.3 on Solaris sparc server V11.5.we are not getting any log from those servers apart from _internal logs. we did below checks. 1.connection fine- telnet happening connected 2.splunkd log -connected to hf and refusing in few seconds. 3.directory path is fine in input.conf file. 4.nothing found in HF audit log. 5.checked firewall logs showing server rest and client reset. 6.debug log collected and share with support team no root cause found. Can you please help on this?  What could be the issue? Is there any configuration need to modified? BR, Jakir
配置了smtp域名,为什么报警邮箱收不到