All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi, I am very new to Splunk. I am familiar with angular as we do all our projects in angular. I would like to know if it is possible to embed the angular app I have developed in Splunk enterpr... See more...
Hi, I am very new to Splunk. I am familiar with angular as we do all our projects in angular. I would like to know if it is possible to embed the angular app I have developed in Splunk enterprise? I have followed a similar tutorial for react and it works just fine. https://github.com/robertsobolczyk/splunk-react-app I was wondering if similar is possible for Angular 2+? Any help would be highly appriciated. Thanks
hi, I'm finding how to calculate each time difference from near 2 events   for example, if my search output is f1    datetime A     ~~ 09:00 A    ~~ 10:00 A    ~~ 15:00 B    ~~ 06:00 ... See more...
hi, I'm finding how to calculate each time difference from near 2 events   for example, if my search output is f1    datetime A     ~~ 09:00 A    ~~ 10:00 A    ~~ 15:00 B    ~~ 06:00 B    ~~ 08:30   I want a table like A 1:00 A 5:00 B 2:30   I prefer to print it without making big temporary output table(for look-up or etc) if I can can I get some ideas?
I have configured  this addon as per the instructions and no matter how many times I set disabled=0, after restarting Splunk, it automatically goes back to disabled=1. Can anyone please advise how ... See more...
I have configured  this addon as per the instructions and no matter how many times I set disabled=0, after restarting Splunk, it automatically goes back to disabled=1. Can anyone please advise how to fix this ?
Hi Team, I have a dashboard with an HTML panel, where I want to display the current page's URL. Could anyone please help?  Is there any way we can pick the URL, store it in a token, and display i... See more...
Hi Team, I have a dashboard with an HTML panel, where I want to display the current page's URL. Could anyone please help?  Is there any way we can pick the URL, store it in a token, and display it in the panel?
Hi Team,   I would like to add a refresh button to the HTML template of the dashboard, to reset all the tokens and display the info from starting based on my selection.    Any idea on where t... See more...
Hi Team,   I would like to add a refresh button to the HTML template of the dashboard, to reset all the tokens and display the info from starting based on my selection.    Any idea on where to start with this?
Hello, This is my very first post here and I need some advice because I've been trying for a couple of hours to extract the time from the following two events (taken from the same log) and build a ... See more...
Hello, This is my very first post here and I need some advice because I've been trying for a couple of hours to extract the time from the following two events (taken from the same log) and build a proper sourcetype, but I couldn't find a solution: ABIT Stack Job [DBS: ABITNET] ABIT_Outbound[extern] (not exclusive, scheduler) (818209397) 08:59:07,602 *** Threads: 2 ExportScheduler [Node http://127.0.0.1:8080/abitnet]-Thread-18727 08:59:07,622 [fmI9CashFlowArch]Export fmI9CashFlowArch wird ausgeführt... Using regex101 I've gotten .*(?:[^ \n]* )*\s(?<time>\d{2}\:\d{2}\:\d{2}\,\d{3}) but when I try to define a sourcetype, the parsing breaks with "Failed to parse timestamp". The problem is most likely the fact that the timestamp is at a different position in the two events. Do you have any ideas? Thank you.
Hi All, I'm running the query  | tstats count where index=<index name> by sourcetype No results   OR  | tstats values(sourcetype) where index=<index name> by index and the results for valu... See more...
Hi All, I'm running the query  | tstats count where index=<index name> by sourcetype No results   OR  | tstats values(sourcetype) where index=<index name> by index and the results for values(sourcetype) is null\empty. I have up to date data with  no delays in indextime . I've checked the fields.conf on indexers and I do see the field [sourcetype] **Also there are sourcetypes that does work and I see the field  Any ideas how to check this? or what can be the issue?   Thanks, Hen
Hi, I have a dashboard and I need to be able to have an option to export the actual log entries from a dashboard. The dashboard in question performs a number of aggregations and the export optio... See more...
Hi, I have a dashboard and I need to be able to have an option to export the actual log entries from a dashboard. The dashboard in question performs a number of aggregations and the export option I currently have just exports these aggregation results. What I actually need is an export of the corresponding events/ log entries of these aggregation results. Like one of the aggregations on the dashboard is a count of the number of firewalls on a each host. How can I export all the respective log entries for those specific firewalls on that host? At the moment, I can get these logs when I perform a search but I need the option on the actual dashboard to export these logs? Can you please help? Many thanks, Patrick  
Thanks to @niketn I can now click on a table row, and get the whole row highlighted as needed. Step 1: When clicking on a row, the selected row is highlighted (Working OK) What I am trying to do... See more...
Thanks to @niketn I can now click on a table row, and get the whole row highlighted as needed. Step 1: When clicking on a row, the selected row is highlighted (Working OK) What I am trying to do is: Step2: I have multi-select inputs and when "All" is selected in multi-select, I want to remove the highlight from the table row. Step3: Also would like to highlight multiple rows if more than one choice is selected in multi-select. I am new to JS and tried the below JS  for Step 2 but it isn't working. Any help would be appreciated require([     'underscore',     'jquery',     'splunkjs/mvc',     'splunkjs/mvc/simplexml/ready!' ], function(_, $, mvc) {     // Access tokens via Default Token Model     var defaultTokenModel = mvc.Components.get("default");     // Search id in Simple XML is tableSearch. Get SearchManager object using the same     var tableSearch = mvc.Components.get("tableSearch");     // On click of Table cell with id=highlight, set the highlighted class for CSS Override     // Fetch the highlighted row id from DOM.     // For pagination will require:     //    (i) Either Row ID as a table column to be fetched OR     //    (ii) Use TableView to handle Custom Cell Renderer     $(document).on("click", "#highlight table td", function() {         // Apply class of the cells to the parent row in order to color the whole row         $("#highlight table").find("td.highlighted").each(function() {             $("#highlight table tr").removeClass("highlighted");             $(this).parents("tr").addClass(this.className);             // Set Table Row id to highlighted_row_id (This approach would need change for pagination)             defaultTokenModel.set("highlighted_row_id", $(this).parents("tr").attr("data-row-index"));         });     });     // When the Table Cell Completes, highlight previously selected Table Row.     tableSearch.on("search:done", function(properties) {         var highlighted_row_id = defaultTokenModel.get("highlighted_row_id");         // setTimeout May not be required with Custom Cell Render.         // But for Table Row Highlighting post 6.6 even with Custom Table Cell Renderer this is required.         setTimeout(function() {             $("#highlight table tr[data-row-index='" + highlighted_row_id + "']").addClass("highlighted");         }, 100);     });     $('#multi'), on("change", function() {         var multi = mvc.Components.get("multi");         var tokens = mvc.Components.get("default");         var mytoken = tokens.get("multi");         if (mytoken.length > 1 && mytoken.includes("All")) {             var highlighted_row_id = defaultTokenModel.get("highlighted_row_id");             $("#highlight table tr[data-row-index='" + highlighted_row_id + "']").removeClass("highlighted");         }     }); });  
Hi, I have installed "Splunk Add-on for Microsoft Cloud Services" both on my Search peers and Heavy Forwarder. Im getting a lot of warn messages : Search peer splunk-sh-name has the following m... See more...
Hi, I have installed "Splunk Add-on for Microsoft Cloud Services" both on my Search peers and Heavy Forwarder. Im getting a lot of warn messages : Search peer splunk-sh-name has the following message: Health Check: msg="A...with exit status: 255" input="./opt/splunk/etc/apps/Splunk_TA_microsoft-cloudservices/bin/mscs_azure_event_hub.py" stanza="mscs_azure_event_hub://azure" During a search in the index=_internal , saw error of : message="Blob checkpoint store not configured" pos=mscs_azure_event_hub.py:_try_creating_blob_checkpoint_store I dont have checkpoint at all , why would it warn me about something i have not ever configured? How can i stop it from attempting to create checkpoint blob?
trying to list the total number of allowed connections to a destination IP from any/all source IP's currently using the following search, index=firewall_usa dest_ip=xx.xx.xx.xx action=allowed  |... See more...
trying to list the total number of allowed connections to a destination IP from any/all source IP's currently using the following search, index=firewall_usa dest_ip=xx.xx.xx.xx action=allowed  | stats count BY src_ip dest_ip | where count > 1 | sort – count   Is there a better/ quicker way to do this  
Hi, After upgrade to version Splunk Ent  version 8.2.5: All "single values" in all dashboards do not scale anymore relative to the height, showing max fontsize, not honouring the height of the pan... See more...
Hi, After upgrade to version Splunk Ent  version 8.2.5: All "single values" in all dashboards do not scale anymore relative to the height, showing max fontsize, not honouring the height of the panels. All dashboard suffering with this issue. Checked it on other Splunk instance and have the same issue. Already created a support-request. Any suggestions in the meantime? regards AshleyP
Hello Team, we have selected the rising column feature of DBX that allows Splunk to incrementally import new database records. But it’s not working and getting old logs into our Splunk aswell.  w... See more...
Hello Team, we have selected the rising column feature of DBX that allows Splunk to incrementally import new database records. But it’s not working and getting old logs into our Splunk aswell.  we need logs from the 01st March 2022 but we are receiving logs from the last year 2021.  select * from xxxxxxxxxxxxxxx SELECT * FROM your_table WHERE LoginDt > ? ORDER BY LoginDt ASC checkpoint value : 3/1/2022 00:00:00.000
Hey partner In my system, every visit consist of one or more transactions and every has its global serial number, which is unique(gsn for short). A transaction may produce many rows of logs, which ... See more...
Hey partner In my system, every visit consist of one or more transactions and every has its global serial number, which is unique(gsn for short). A transaction may produce many rows of logs, which is event in Splunk,  but it has the same gsn. A transaction always ends with "trans end transName", while the "transName" means the name of the transaction, a transaction named Test ends with "trans end Test", for example. Every transaction's name is unique and just appear once per gsn. I can get the transaction's name by using the command below.       rex "trans end (?<transName>\w+)"        I want to fill a common transName field for every event. For example, a transaction log 3 rows, which are treated as 3 events in Splunk. Its gsn is 10000 and its raw logs is like below:       GlobalseqNo:10000 trans end Test GlobalseqNo:10000 log 2 GlobalseqNo:10000 log 1       When I just use the command below, the result is like the table below       rex "trans end (?<transName>\w+)" | table gsn transName       gsn transName 10000 Test 10000   10000      I want to fill a common transName field for every event. So when there are a lot of transactions, the command above will produce the result below gsn transName 10000 Test 10000 Test 10000 Test 10001 A 10001 A 10002 B 10002 B
hello I open a new drilldown window from my dashboard like this   <drilldown> <link target="_blank">search?q=%60index_toto%60%20sourcetype%3D%22ez%3Acrash%22%20type%3D*%20%7C%20stats%20... See more...
hello I open a new drilldown window from my dashboard like this   <drilldown> <link target="_blank">search?q=%60index_toto%60%20sourcetype%3D%22ez%3Acrash%22%20type%3D*%20%7C%20stats%20count%20as%20crash%20by%20host%20_time&amp;earliest=-7d@h&amp;latest=now</link></drilldown>   the exact search is   `index_toto` sourcetype="ez:crash" type=* | stats count as crash by host _time   I would like to add a token on the field host in order to display the results for this host in the new window results could you help please?  
Well, my question is not that intuitive, but I will deep dive here: Let's suppose I have this lookup: Name Product Sell_Date Denis Bread 2022-02-21 Maria Beer 2022-02-23 Denis Wa... See more...
Well, my question is not that intuitive, but I will deep dive here: Let's suppose I have this lookup: Name Product Sell_Date Denis Bread 2022-02-21 Maria Beer 2022-02-23 Denis Water 2022-01-27 Denis Cheese 2022-03-05 Maria Beer 2021-12-12 I need to get the last "Sell_Date" grouping by "Name". In this case: Name Product Sell_Date Denis Cheese 2022-03-05 Maria Beer 2022-02-23 I know there is "dedup" command, but it's not working because "Sell_Date" is not being considered as "_time" field because this is a lookup and not an Index. I'm getting the wrong row as dedup result. How can I get a custom dedup, specifying the field that should work as "_time"? 
Hi everyone, Just wondering how to use proxy server to relay the traffic for the onprem federated search head to a splunk Cloud instance? I have a look at the federated.conf, but could not find a... See more...
Hi everyone, Just wondering how to use proxy server to relay the traffic for the onprem federated search head to a splunk Cloud instance? I have a look at the federated.conf, but could not find a proxy setting? https://docs.splunk.com/Documentation/Splunk/8.2.5/Admin/Federatedconf Or should we just use the splunkd proxy settings? https://docs.splunk.com/Documentation/Splunk/8.2.5/Admin/ConfigureSplunkforproxy Many thanks, S
Good Morning, I am attempting to use visualization that will display the averages of 2 specific fields (bytes_in and bytes_out) in the same chart, overtime. I've attempted to do research through v... See more...
Good Morning, I am attempting to use visualization that will display the averages of 2 specific fields (bytes_in and bytes_out) in the same chart, overtime. I've attempted to do research through various older posts however most of them involving combining multiple fields into 1 average which is something I do not want to do. Others had suggestions that were similar to what I was asking but didn't display it overtime, rather it just displayed data on the day. An extremely helpful bonus if you guys are also able to provide help/solution on how to display multiple time instances as well in the chart (24H, 7D, 30D) rather than having to create 3 panels.
Hi all, I have this question and couldn't find the answers so far so posting here in hoping to find some knowledge. Q1) When a universal forwarder sends logs based in inputs.conf/ http even colle... See more...
Hi all, I have this question and couldn't find the answers so far so posting here in hoping to find some knowledge. Q1) When a universal forwarder sends logs based in inputs.conf/ http even collector to an Indexer cluster or indexer does it gets any acknowledgment that the data is received?  
Hi,  I'm having no luck getting a filter-n-drop setup...  I referenced  https://docs.splunk.com/Documentation/Splunk/8.2.5/Forwarding/Routeandfilterdatad Discard specific events and keep the rest ... See more...
Hi,  I'm having no luck getting a filter-n-drop setup...  I referenced  https://docs.splunk.com/Documentation/Splunk/8.2.5/Forwarding/Routeandfilterdatad Discard specific events and keep the rest   props.conf [source::/opt/fooBar/*] TRANSFORMS-null = setnull transforms.conf [setnull] REGEX = ^(DEBUG) DEST_KEY = queue FORMAT = nullQueue     I am not sure if the REGEX is correct, but "debug" is seen in ERROR events so I only want to capture and drop events where DEBUG is the first word...   Any help appreciated. Thank you!