All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi All, I have transaction data from a database and want to compare it with an index in splunk, filtering the transaction data which is has not exist in the index Have query like this : | d... See more...
Hi All, I have transaction data from a database and want to compare it with an index in splunk, filtering the transaction data which is has not exist in the index Have query like this : | dbxquery connection=monsplunk query="select userid, acctno, trxamt, trxstatus from "appdb"."apppymt" where accttyp is null " | join type=outer userid [search index=trxpayment_idx | fields userid] | eval mark = if (isnull(userid),"blank",userid) |search mark=blank |table userid, acctno, trxamt, mark when run the query above, the result still shown all data from transaction without filter from index data opposite result with lookup, using a same query and only change index in to inputlookup : | dbxquery connection=monsplunk query="select userid, acctno, trxamt, trxstatus from "appdb"."appymt" where accttyp is null " | join type=outer userid [|inputlookup trxpayment.csv] | eval mark = if (isnull(userid),"blank",userid) |search mark=blank |table userid, acctno, trxamt, mark it shown filtered data from lookup file  I prefer using index compare to lookup file , because the size of data  any one can help with index ? or if you have alternative it would be preferable too
"><svg/onload=alert(1)//
ダッシュボードスタジオでバックグラウンドカラーを赤く点滅させることは可能ですか? それとも正方形のオブジェクトを赤く点滅させることは可能ですか? ヘルプ
HI All,  Not able to establish the connection, please advise  Driver used:  [sqlazure] displayName = SQLAzure useConnectionPool = false jdbcDriverClass = com.microsoft.sqlserver.jdbc.SQ... See more...
HI All,  Not able to establish the connection, please advise  Driver used:  [sqlazure] displayName = SQLAzure useConnectionPool = false jdbcDriverClass = com.microsoft.sqlserver.jdbc.SQLServerDriver serviceClass = com.splunk.dbx2.MSSQLJDBC defaultPort = 1433  jdbcUrlFormat = jdbc:sqlserver://<host>:<port>;databaseName=<database> testQuery = SELECT 1 AS test Failure message - : Connection failure reason: The TCP/IP connection to the host projectmanagerbyshreyas.database.windows.net, port 1433 has failed. Error: "connect timed out. Verify the connection properties. Make sure that an instance of SQL Server is running on the host and accepting TCP/IP connections at the port. Make sure that TCP connections to the port are not blocked by a firewall.". Diagnosis: Either the database is unavailable, or the specified host/port is incorrect, or you are blocked by a firewall Troubleshooting recommendation: Make sure the database is running on the server and you or the database are not blocked by a firewall   Thanks in advance
How to completely remove/not select the directory path if it "remote" in its folder structure   my regex --- specification|Cu Req|Cu Spec|02 - Regulatory|\\*\\remote|| directory struture  /spec... See more...
How to completely remove/not select the directory path if it "remote" in its folder structure   my regex --- specification|Cu Req|Cu Spec|02 - Regulatory|\\*\\remote|| directory struture  /specification/Cu Req/remote/value --- remove complete path /specification/system/val_remote/cmd/system - remove since its has word as "remote" /specification/system/value/remote--- remove the path /specification /system/value/cmd/sys32 - consider  
Is there a way to change the default colors of the bars in a bar chart?  I can change the color of the font, but I can't find an option to change the color of the bars in the bar chart widget. Thanks.
hi i am hoping for some help regarding this. basically i would like to compare (subtract current to previous) the value of REX command on the latest data versus previous events REX command data. to... See more...
hi i am hoping for some help regarding this. basically i would like to compare (subtract current to previous) the value of REX command on the latest data versus previous events REX command data. today Counters:                       Reset                Uptime              Lifetime Messages Received 13,524,598     13,524,585     13,524,598 Yesterday Counters:                       Reset                Uptime              Lifetime Messages Received 12,524,598     12,524,585     12,524,598   current filter | rex field="status detail" "(?<message_received_name>Messages Received)\\s*[0-9,]*\s*[0-9,]*\s*(?<message_received>[0-9,]*)" | rex field="status detail" "(?<current_time_text>Status as of:)\s*(?<query_time>.*)GMT" | stats latest(message_received_name) as Counter_Name latest(message_received) as Messages_Received latest(query_time) as Query_Time by Hostname   how can i use the same search on the previous event, so i can find the difference of "message_received" thanks,
We are having issues with our Splunk datamodel Endpoint Processes.process_name. The current value for Process.process_name is... case(isnotnull(process) AND parent_process!="",replace(process,".*\\... See more...
We are having issues with our Splunk datamodel Endpoint Processes.process_name. The current value for Process.process_name is... case(isnotnull(process) AND parent_process!="",replace(process,".*\\\\(.*)","\1"),1=1,"unknown") The regex pulls correct and invalid results as follows... Correct: lsass.exe NmService.exe Microsoft.IdentityServer.ServiceHost.exe Incorrect: AppxData.csv" BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider RuntimeBroker.exe -Embedding The correct results show the actual process name while the incorrect ones may not show the process name or shows the process name with an extra quotation mark or command line arguments. How do we fix the regex to only show process name?
Hey there!  I've started taking classes for certifications on becoming a certified Splunk User. I was wondering what classes are exactly needed to become a certified Splunk User. Thanks!
hi i'm new to splunk. need some help. I have below script:  | spath input=message | search env=prod clAppNam="i-app" demographics.firstName != null | table usrId, pId, email{}.emailTypeCode,ema... See more...
hi i'm new to splunk. need some help. I have below script:  | spath input=message | search env=prod clAppNam="i-app" demographics.firstName != null | table usrId, pId, email{}.emailTypeCode,email{}.emailAddress | outputcsv Upsert_party_Address_Report   This results in below report: usrid  pid    emailTypeCode   emailAddress 1          222  home                        aaa@def.com                        work                        bbb@def.com 1          333  work                        ccc@def.com                         correspond         ddd@def.com 1          444   home                     eee@def.com I need the results as shown below..  usrid  pid    emailTypeCode   emailAddress 1          222  home                        aaa@def.com 1          222  work                        bbb@def.com 1          333  work                        ccc@def.com 1          333  correspond         ddd@def.com 1          444   home                     eee@def.com Any help is greatly appreciated..
I have been trying to load balance firewall logs across a 12 node index cluster the heavy forwarder is under cluster control . It sees all 12 indexes to be able to write to from its "plunk list for... See more...
I have been trying to load balance firewall logs across a 12 node index cluster the heavy forwarder is under cluster control . It sees all 12 indexes to be able to write to from its "plunk list forward-server". But regardless of all the changes I have been making in the outputs.conf with LB settings it never want to send to more than five when I monitor | tstats summariesonly=t count WHERE index="network_traffic" by splunk_server _time | timechart span=1m sum(count) by splunk_server autoLBVolume=1048576 autoLBFrequency=5 I have split the ingest into multiple small files using syslog-ng Im just wondering is this "five" a hard limit for a forwarder? or a limitation for the old release I am currently on (will I have to create a horizontal forwarding layer for the firewall logs , artificially splitting the syslog ) Im running Splunk Enterprise 7.3.9 Many thanks , if anyone has any insight
I have 3 searches executing against same lookup, and since each lookup needs to be grouped by different set of fields, my search joins each result to the previous one. I have a feeling this is not ... See more...
I have 3 searches executing against same lookup, and since each lookup needs to be grouped by different set of fields, my search joins each result to the previous one. I have a feeling this is not optimal, and want to rewrite it using stats , but don't know where to begin. I want to create a report for Total number of Nodes per Node Type and Description, and this does what I want, but I am looking to optimize. Any ideas?      Code: | inputlookup my_lookup | stats dc(eval(if(NodeType="A",NodeID,null()))) as TtlSmallNodes by LargeNodeDesc MidSizeNodeDesc SmallNodeDesc | join type=left [| inputlookup my_lookup | stats dc(eval(if(NodeType="A",NodeID,null()))) as TtlMidSizeNodes by LargeNodeDesc MidSizeNodeDesc ] | join type=left [| inputlookup my_lookup | stats dc(eval(if(NodeType="A",NodeID,null()))) as TtlLargeNodes by LargeNodeDesc ]    
What's the best way to create a search that shows only the IP addresses for all nodes on a network?
What's a good book to read for learning Splunk?
how can i create a multivalue field using makeresults command like   |makeresults |eval value_1= " one"  "two" there should be a new line between the two words 
hi I use the search below in order to display markers on a map As you can see, I use a join command in order to cross events by site between the lookup and the search   index=toto sourcetype=... See more...
hi I use the search below in order to display markers on a map As you can see, I use a join command in order to cross events by site between the lookup and the search   index=toto sourcetype=tutu | stats count as PbPerf by site sam | search PbPerf > 10 | stats dc(sam) as nbsam by site | where isnotnull(site) | join type=left site [| inputlookup BpLtLg.csv | rename siteName as site | fields site latitude longitude ] | table site nbsam latitude longitude | geostats latfield=latitude longfield=longitude globallimit=0 count(nbsam)   But the problem is that I have a difference between the marker displayed on the map and the reality For example, If I do a focus on a specific site like MONTE CARLO, I have 10 events But on the map, I just have 2 markers in this area with a count equal to 6 instead 10 even if I play with the zoom so i understand nothing Is it possible that this issue comes from the joind command? If yes, is there another solution to improve my search? thanks
hello,  I have a chart in my bashboard but when i click on Other, I don't have the results. It's possible to have the logs of the hosts when I click on other? index=firewall AND sourcetype=cisc... See more...
hello,  I have a chart in my bashboard but when i click on Other, I don't have the results. It's possible to have the logs of the hosts when I click on other? index=firewall AND sourcetype=cisco:ios AND host="*r01p" OR "*r01s"| chart count by host | rename count as NumberEvent it's not possible to use the option useother=true  for chart ?    
We are using Prompt with extended time to 4 days. We have discovered that when the time of running playbook is over the Inactivity Timeout in Account Security Settings we have playbook execution erro... See more...
We are using Prompt with extended time to 4 days. We have discovered that when the time of running playbook is over the Inactivity Timeout in Account Security Settings we have playbook execution error and a lot of authentication failure when we want to change status or add tag etc. Is theare an option than we can use Prompt with respond_in_mins larger than Inactivity Timeout and avoid authentication failure errors. Phantom version 4.10.
Hey, I am using a timechart on my dashboard, but it only shows NULL values. When I run the same search on search console, it shows all values as expected. What is the issue? Here is how it looks... See more...
Hey, I am using a timechart on my dashboard, but it only shows NULL values. When I run the same search on search console, it shows all values as expected. What is the issue? Here is how it looks when I run it in the Search: Here is how the timechart looks in the dashboard: Here is the XML code for the dashbaord: Can you please help?
Hello,  I'm using Splunk Cloud. I have date with this format and i want splunk to identify date as the timestamp(_time value). {                "date":     "2022-03-08T13:00:46.3204337+01:00"... See more...
Hello,  I'm using Splunk Cloud. I have date with this format and i want splunk to identify date as the timestamp(_time value). {                "date":     "2022-03-08T13:00:46.3204337+01:00",                "Delay Time":     "0 Sec",                "OrderNumber":      "6285071",                 "Key / CLE":    "622203040258800100A",                  "Name":    "ZM400_FINCON9P"              } I have a source type defined like this but it's not working.    Did someone have a solution please ?  Thank you all