All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi Team, Need help to find the account owner for the cloud(AWS,GCP and azure) in splunk serch ?Is it possible to help in getting quirires for the same? Regards, Kushal
In the documentation on dataset literals there is an example query: FROM [ { state: "Washington", abbreviation: "WA", population: 7535591 }, { state: "California", abbreviation: "CA", population: 3... See more...
In the documentation on dataset literals there is an example query: FROM [ { state: "Washington", abbreviation: "WA", population: 7535591 }, { state: "California", abbreviation: "CA", population: 39557045 }, { state: "Oregon", abbreviation: "OR", population: 4190714 } ] WHERE population > 5000000 SELECT state If I try to run this or any other query with a dataset literal I get an error: Error in 'SearchParser': Missing a search command before '{'. Error at position '26' of search query 'search FROM [ { state: "Washington", a'. Any idea why? Thanks.
My requirement is to generate alert if no file received within cut off time for set of files say around 50. I want o avoid creating alert for each file. Please suggest me the best approach
Hello all,   For some reason, I think these events are too long for me to use the field extractor so I was hoping for some help creating some regex.  I am looking to extract Account Name, Source ... See more...
Hello all,   For some reason, I think these events are too long for me to use the field extractor so I was hoping for some help creating some regex.  I am looking to extract Account Name, Source Network Address and Workstation Name. Any assistance would be much appreciated.  Sample event
I'm trying to create a statistics table for whether or not a given Linux service is running on a set of hosts.  For example, for service "rhnsd" running on hosts "my-*" ... Host State ... See more...
I'm trying to create a statistics table for whether or not a given Linux service is running on a set of hosts.  For example, for service "rhnsd" running on hosts "my-*" ... Host State my-db-1 Running my-db-2 Stopped my-web-1 Running my-web-2 Stopped   I have the ps module enabled, so I can use that as a source/sourcetype, but not sure how to eloquently display all hosts and the state of the given service like I've illustrated above.  Any help is greatly appreciated.
Having when adding the Azure App Account. Constant getting authentication Fail. Verify Client ID, Key Secret, Tenant ID with Account Class Type for Azure Government Account.  Any assistance would be ... See more...
Having when adding the Azure App Account. Constant getting authentication Fail. Verify Client ID, Key Secret, Tenant ID with Account Class Type for Azure Government Account.  Any assistance would be greatly appreciated.   Thomas 
hello I need to use a relative time in my search wich specify 8 days ago between 7h and 19h from now I try this but it doenst works   earliest=@-8d+7h latest=@-8d+19h   how to do please?
Hi everyone I'm new using AppDynamics and I need to know with which extension could I monitor one or more IP addresses? I need to get uptime and response time. I just need a ping. These IP addr... See more...
Hi everyone I'm new using AppDynamics and I need to know with which extension could I monitor one or more IP addresses? I need to get uptime and response time. I just need a ping. These IP addresses could be from servers or networks components. There is an extension for this? Thanks in advance 
How can I use splunk token to access splunk service in python?
Hello, I am working in an environment where I have to create multiple deployment servers. Here two questions came to my mind: - Is it possible for deployment servers to deploy apps without having a... See more...
Hello, I am working in an environment where I have to create multiple deployment servers. Here two questions came to my mind: - Is it possible for deployment servers to deploy apps without having any license? - Can I just add manually the license to each deployment server? or is it only possible to do this via a license master? Thank you. Regards.
Gentlemen,  Need some help with lookup command.  i have a lookup table (csv) which is a master list of user accounts. It looks something like this. user_id first last email pho... See more...
Gentlemen,  Need some help with lookup command.  i have a lookup table (csv) which is a master list of user accounts. It looks something like this. user_id first last email phone manager             I have a Scheduled search that runs daily . This search  shows only the users that been modified , updated or newly created . How can i append the results of this search to my above csv lookup file in such a way that it does not create duplicates ?   Basically  if the user record already exits in the csv and if the search finds one of his attributes has been updated ( for example: manager ),  then the outlookup should update the existing user record  in the csv rather than creating a duplicate one.  Hope i am clear. I read some posts about users recommending   to use the below command, but don't understand how does appending solve this use case ?  Should i be using this ?   | append [inputlookup <lookup_csv>]   The "Scheduled Search"  is configured to "append"  to the csv lookup in its properties.     Thanks in advance
hello, Good day. I'd like to ask if the integration of Appdynamics with Remedy is possible and if there is any guide in the documentation? ^ Edited by @Ryan.Paredez for clarity and searchability
I'm trying to match all domains from a lookup file with a base search and get a count of the events for each one even if there are no events matching (0 count): mysite.com  count 12 anothersite.c... See more...
I'm trying to match all domains from a lookup file with a base search and get a count of the events for each one even if there are no events matching (0 count): mysite.com  count 12 anothersite.com count 5 myothersite.com count 0         index=application sourcetype=mysource | lookup myfile.csv Domain as <corelated event field> | append [ | inputlookup myfile.csv | fields Domain] | stats count as total by Domain | fillnull value=0 total | table total | sort -total         If you can, please explain your answer - whether there is a syntax error, a keyword misuse, or conceptual error on my part. 
I'm trying to extract the total word count from field1 but am unable to find the correct solution. The format is:  field1: {'totalWordCount': 44891, 'totalUsers':49, 'usUsers':20, 'publishers':18, ... See more...
I'm trying to extract the total word count from field1 but am unable to find the correct solution. The format is:  field1: {'totalWordCount': 44891, 'totalUsers':49, 'usUsers':20, 'publishers':18, 'articlesByCountry': {'CA':124, 'US':50, 'AUS':19, 'NZ':2}, 'publishersbyCountry':{'CA':124, 'US':50, 'AUS':19}} Theres much MUCH more to this field than I listed above but I am only interested in the total word count. Any idea how to extract this information?  I've tried |rex field=field1 "'totalWordCount': * " but get an error message "The regex "totalWordCount':*' does not extract anything. It should specify at least one name group. Format: (?<name>...). Im still new to Splunk so bear with me!
<title> Clam Scan Results </title> <event> <search> ref="anti-virus scan results"> </search> <option name="list.drilldown" >none</option>   I have been trying to input this query into Splunk ... See more...
<title> Clam Scan Results </title> <event> <search> ref="anti-virus scan results"> </search> <option name="list.drilldown" >none</option>   I have been trying to input this query into Splunk and I am getting the following error: error in 'search' command: unable to parse the search: Comparator '<' is missing a term on the left hand side.   I have removed the > before the ref, but I still get the same result. Can anyone help me solve this?
Hi guys, I tried to configure the Microsoft Azure addon grabber and on azure I didn't find the work space ID Can you help me please? Thanks A.
Hi, To import csv files do we need a heavy forwarder or can we just use a universal forwarder? I tried  a universal forwarder(with no Transforms.conf or props.conf) on one machine and work and now ... See more...
Hi, To import csv files do we need a heavy forwarder or can we just use a universal forwarder? I tried  a universal forwarder(with no Transforms.conf or props.conf) on one machine and work and now i tried in another machine and doesnt work( error:Bug during applyPendingMetadata, header processor does not own the indexed extractions confs.). I´m new in splunk can anyone help?   Thanks in advance.
How to Remove Horizontal Scrollbar in Transpose Table? The scrollbar is appearing below the table.  
I have two search queries: | metadata index=* type=sources that results in something like the following (under the source field) /lorem/ipsum/dolor/sit/tortor-adaptor.log /lorem/ipsum/dolor/si... See more...
I have two search queries: | metadata index=* type=sources that results in something like the following (under the source field) /lorem/ipsum/dolor/sit/tortor-adaptor.log /lorem/ipsum/dolor/sit/tortor-adaptor.log.1 /lorem/ipsum/dolor/sit/tortor-adaptor.log.10 /lorem/ipsum/dolor/sit/tortor-adaptor.log.11 /lorem/ipsum/dolor/sit/tortor-adaptor.log.12 /lorem/ipsum/dolor/sit/tortor-adaptor.log.13 /lorem/ipsum/dolor/sit/tortor-adaptor.log.14 /lorem/ipsum/dolor/sit/tortor-adaptor.log.15  then there's the following search | tstats values(source) where index=* that produces something like the following (under the values(source) field) /lorem/ipsum/dolor/sit/tortor-adaptor.log /lorem/ipsum/nunc-test.log.1 /lorem/ipsum/dolor/sit/pulvinar/ex-eros.log /comsed/ipsum/dolor/ut-eget.log /donec/sit/nam-libero.log.1 /aliquet/ipsum/dolor/sit/vel-arcu.log   Why is Splunk showing me different results? Also, how can I search for all the increments of the source if I know what it is? For example, if I have "/lorem/ipsum/dolor/sit/tortor-adaptor.log" how can I find all of its increments (e.g. "/lorem/ipsum/dolor/sit/tortor-adaptor.log.1, /lorem/ipsum/dolor/sit/tortor-adaptor.log.2, /lorem/ipsum/dolor/sit/tortor-adaptor.log.3")?