All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Getting error " [CANNOT EVALUATE: Could not find specified method = [XXX()]" while try to do datacollection. I have done the live preview and data is there in XXX(). Please advise a solution for the ... See more...
Getting error " [CANNOT EVALUATE: Could not find specified method = [XXX()]" while try to do datacollection. I have done the live preview and data is there in XXX(). Please advise a solution for the same,
hi I use a timechart which is linked to a "today" token time  On the x axis, I need only to display events between 7h and 19h I tried this but the x axis go to 0.00h from the current time How... See more...
hi I use a timechart which is linked to a "today" token time  On the x axis, I need only to display events between 7h and 19h I tried this but the x axis go to 0.00h from the current time How to do for the x axis begin only a 7h00? thanks   index=toto | eval local_time=strftime('_time', "%H%M") | search local_time >="0700" AND local_time <="1900" | timechart span=15min dc(s) as user by type    
functionality of these add-ons ?   ・Trend Micro Deep Security for Splunk ・Splunk Add on for Amazon Web Services ( all reply will appreciated with karma )
Hello  All, Our Ldapsearch command is not pulling in the manager Name of employees even though i have explicitly called out manager in attrs as shown below.  Any suggestion why ?   |" ldapsearch... See more...
Hello  All, Our Ldapsearch command is not pulling in the manager Name of employees even though i have explicitly called out manager in attrs as shown below.  Any suggestion why ?   |" ldapsearch domain="XXXX.COM" search="(&(objectclass=user)(!(objectClass=computer)))" attrs="sAMAccountName,personalTitle,displayName,givenName,sn,mail,telephoneNumber,mobile,manager,department,whenCreated,userAccountControl" | table...    
hi I use a lookup with a field corresponding to a site name | inputlookup site.csv | search site=*paris*  In this lookup field, the site can be called in many way : "PARIS 1", "Paris 2", "Paris XX... See more...
hi I use a lookup with a field corresponding to a site name | inputlookup site.csv | search site=*paris*  In this lookup field, the site can be called in many way : "PARIS 1", "Paris 2", "Paris XX"... I use this lookup in a join command in order to cross data index=toto sourcetype=tutu | stats count as Pb by site | join type=left site [| inputlookup site.csv ] | table site the problem I have is that in my main search the site for PARIS is always called "Paris" So what I need is to cross all the events which starts by "Paris" with my lookup where there is a lot of different "Paris" syntax How to do this please?
hi, i a total newbie i need to do a search in splunk matching the domain in my lookup table (master_lookup.csv) my table have the columns indicators, published_date , last_update, labels my index... See more...
hi, i a total newbie i need to do a search in splunk matching the domain in my lookup table (master_lookup.csv) my table have the columns indicators, published_date , last_update, labels my index is below ((index=bcoat_logs AND sourcetype=bluecoat:proxysg:access:file ) OR (index=nanolog_906062_zscaler AND sourcetype=zscalernss-web)) how do i have the output when it match the indicators my desired output will include _time, indicators, published_date , last_update, labels
Hi I use this CSS code in order to enlarge the size of the data values in the bars chart Now I also need to enlarge the x and the y axis label size How to do this please? <style> #myHighChart... See more...
Hi I use this CSS code in order to enlarge the size of the data values in the bars chart Now I also need to enlarge the x and the y axis label size How to do this please? <style> #myHighChart g.highcharts-data-label text { fill: white !important; font-weight: bold !important; font-size: 20px !important; } </style>  
Hi,  I've found a bug in the Splunk Add-on Builder and I've tried to report it but I'm not having much luck. From my Splunk account I try to open a ticket and get this message:  "It appears you do ... See more...
Hi,  I've found a bug in the Splunk Add-on Builder and I've tried to report it but I'm not having much luck. From my Splunk account I try to open a ticket and get this message:  "It appears you do not have an active Support Contract or entitlement, and as a result, cannot open a Support case" From the add-on builder page I try to file a case but that just goes to:  "URL No Longer Exists You have attempted to reach a URL that no longer exists on salesforce.com." I tried calling Splunk but they put me through to sales then dropped my call. I was hoping someone might point me in the right direction to help Splunk fix this issue. Thanks.
How to check inputs.conf file to see the how the log files are being sent to splunk.    How to check forwarder is running and moved data to splunk index? 
Hi, I am unable to create a simple alert using the following documentation.  As per documentation, the required parameters are Search and name. Following code is written in Javascript Here is... See more...
Hi, I am unable to create a simple alert using the following documentation.  As per documentation, the required parameters are Search and name. Following code is written in Javascript Here is my request: const data = { "alert_comparator": "equal to", "alert_threshold": "0", "alert_type": "number of events", "cron_schedule": "*/1 * * * *", "search": "index%3D%22global-events-qa%22%20functionName%3D%22correspondence-service%22", "name": "Simple alert" } const response = await axios.post(' https://app.splunkcloud.com:8089/services/saved/searches', data,{ headers: { ...(await getAuth({region: 'ap-southeast-2'}))} }); Here is the error:  Cannot perform action "POST" without a target name to act on. Documentation Link: https://docs.splunk.com/Documentation/Splunk/latest/RESTREF/RESTsearch?_ga=2.62077416.557388192.1646109950-663789425.1628561939#saved.2Fsearches It will be really great if you could share some working examples somewhere in your documentation.  Thanks in advance!
Hi There, I have got some results in after running the below command my search |  | bucket _time span=1h | stats count by _time http_status | eventstats sum(count) as totalCount by _time | eval... See more...
Hi There, I have got some results in after running the below command my search |  | bucket _time span=1h | stats count by _time http_status | eventstats sum(count) as totalCount by _time | eval percent=round((count/totalCount),3)*100 | fields - count - totalCount Output is as follows time                                      status                    percent 2022-03-02 05:30:00 100 10.0 2022-03-02 05:30:00 200 30.0 2022-03-02 05:30:00 300 60.0 2022-03-02 06:30:00 100 30.0 2022-03-02 06:30:00 200 60.0 2022-03-02 07:30:00 300 10.0 2022-03-02 07:30:00 100 20.0 2022-03-02 07:30:00 200 30.0 2022-03-02 06:30:00 300 50.0   I am trying to transpose the output as below : time                                     100                        200     300  2022-03-02 05:30:00 10.0 30.0 60.0 2022-03-02 06:30:00 30.0 60.0 10.0 2022-03-02 07:30:00 20.0 30.0 50.0   please assist
Hi All,  Have searched for many months and unable to locate what i need. something i believe should be so simple is alluding me..looking for some help on this.  I am trying to change the colour o... See more...
Hi All,  Have searched for many months and unable to locate what i need. something i believe should be so simple is alluding me..looking for some help on this.  I am trying to change the colour of a bar / column chart to represent a different colour per the size of the shop and showing how many alarm incidents they have had. Visually this should allow me to see a comparison of alerts across my Large shops / my Small Shops by looking at a color only and not having to remember each shops size. ie all green shops are small.  My test table is as followed : On my Graph i would like for the Size of the Shop to be color coded - Large - blue, Medium-yellow, Small-green ( the color of the 3 sizes i am not fussy on) .  Shop Size TypeReport NoEvents A Large FrontAlarm 76 A Large BackAlarm 115 B Small FrontAlarm 37 B Small BackAlarm 132 C Medium FrontAlarm 81 C Medium BackAlarm 39 D Large FrontAlarm 159 D Large BackAlarm 110 E Small FrontAlarm 26 E Small BackAlarm 71 F Medium FrontAlarm 113 F Medium BackAlarm 49   I have tried several Evals but just do not see to be able to get this right. I have tried to follow several answers within the splunk community on this topic, but due to the answers evaluating time - its throwing me out and thus losing that last piece to the puzzle - i have been trying things such as -  | inputlookup Testcolor.csv | search TypeReport="FrontAlarm" | stats count by NoEvents | eval {NoEvents}=count | fields - count and changing the source with the below but still no luck.  <option name="charting.fieldColors">{"A":#32a838,"B":#006D9C,"C":#006D9C,"D":#32a838,"E":#006D9C,"F":#006D9 }</option> To even trying  | inputlookup Testcolor.csv | search TypeReport="FrontAlarm" | stats count by NoEvents | eval Shop="A, B, C, D, E, F" | makemv Shop delim="," | mvexpand Shop | eval count=NoEvents | table Shop count | eval {Shop}=count | fields - count   The above Seemed to get me close but no cigar. I have another 6 weeks before i really need to figure this out, any help would be appreciated.  ( Id also prefer to build this in dashboard studio if that does help my problem - i am also only using static data so times are pulled in)  Cheers    
If I do an index search, raw events are listed in reverse _time order, which is often also the reverse _indextime order so I don't exactly know which.  But if I table the results, the table is no lon... See more...
If I do an index search, raw events are listed in reverse _time order, which is often also the reverse _indextime order so I don't exactly know which.  But if I table the results, the table is no longer in this order.  Why is it so? I used the following to inspect table   sourcetype=sometype | eval indextime=strftime(_indextime, "%F %T") | table _time indextime   The table kind of list later entries first, but not consistent, often swapped by hours.
Hello all, I'd like to compare events in the same log files, amusing the format of the events are the same. For example: event1: ccc, ddd event2: bbb, ccc event3: aaa, bbb As you can see there's... See more...
Hello all, I'd like to compare events in the same log files, amusing the format of the events are the same. For example: event1: ccc, ddd event2: bbb, ccc event3: aaa, bbb As you can see there's a pattern, the 2nd part (bbb) in event3 is always the same as the 1st part in event2, and the 2nd part in event 2 (ccc) is always the same as the 1st part in event 1. My question is how do I check if all the events in the same log file match this pattern. Thank you in advance! Sincerely, Gai
Hey everyone, I am trying to gauge at what time users are active on our app. I want to use data from (All time) to gather the average on a 24 hour scale. Is there a way for I can see the average tim... See more...
Hey everyone, I am trying to gauge at what time users are active on our app. I want to use data from (All time) to gather the average on a 24 hour scale. Is there a way for I can see the average time by hour. Right now this just shows the times when users login. It would be super useful for I can know how many users on average use the app by X AM/PM. My current query is:  index=app1 AND service=app AND logLevel=INFO AND environment=prod "message.eventAction"=START_SESSION |timechart span=1h count This query can gather the users by hour on a 24 hour scale, but not the average from (All time). If anyone could help, it would be greatly appreciated!
I want to create a 30 day index of data that changes it's indexed timestamp as each day passes. Therefore the data will always show up when I do a last 30 day search and don't need to pick out the sp... See more...
I want to create a 30 day index of data that changes it's indexed timestamp as each day passes. Therefore the data will always show up when I do a last 30 day search and don't need to pick out the specific 30 days I saved. Ie if I started with January data, in June 1st the original data from January should represent the month of May. Is there any way to change the time of the data in the index every day? Or does it have to be deleted from index and readded? 
Hello all, I have a simple dashboard with a dropdown under the title. When I add styles into the title, the dropdown input element interferes with that and the full hight of the title panel is not vi... See more...
Hello all, I have a simple dashboard with a dropdown under the title. When I add styles into the title, the dropdown input element interferes with that and the full hight of the title panel is not visible.  This is my current inline style content. I want to display the full hight of my title panel. Can anyone help?     <label>Endpoint Configurations Summary Dashboard</label> <row depends="$alwaysHideCSSPanel$"> <panel> <html> <style> .dashboard-panel h2{ background:#6495ED !important; color:white !important; text-align: center !important; font-weight: bold !important; border-top-right-radius: 15px; border-top-left-radius: 15px; } .highcharts-background { fill: #ffffff !important; } .highcharts-grid-line{ fill: #ffffff !important; } h1 { background:#6495ED !important; color:white !important; text-align: center !important; font-weight: bold !important; border-top-right-radius: 15px; border-top-left-radius: 15px; } h2, h3, p { color: #696969 !important; text-align: center !important; } </style> </html> </panel> </row>      
I want to export the result of a Splunk dashboard and authentication would be via SSO/SAML. I can provide the username and password and Splunk dashboard URL so that python will export the dashboard p... See more...
I want to export the result of a Splunk dashboard and authentication would be via SSO/SAML. I can provide the username and password and Splunk dashboard URL so that python will export the dashboard pannel and save the exported result in csv.
Hello, I have a search that runs in the web application interface (Splunk Enterprise). It returns results as and when log events are present within the search parameters (time window). I execute ... See more...
Hello, I have a search that runs in the web application interface (Splunk Enterprise). It returns results as and when log events are present within the search parameters (time window). I execute the exact same search at the same time via the REST API using Postman, it completes (Job status="DONE") but with zero available events or any events at all. Why might that happen? The search is copied and pasted from the web app to the API call in Postman. On occasion, it has worked but maybe one in a thousand calls will fetch results. Thank you.
I'm attempting to build a search around Okta authentication logs.  I want to run a query to check for any Multi factor update/change, collect the user ID and pass that to another search where I see t... See more...
I'm attempting to build a search around Okta authentication logs.  I want to run a query to check for any Multi factor update/change, collect the user ID and pass that to another search where I see the geolocation data where the User has authenticated previously over a specific time span.  Essentially, I'm trying to build a search to see if a user that requested an MFA change is doing it from a different geolocation than they normally authenticate from. The query below shows all users that have have a MFA change with their corresponding geolocation data.  Is there a way to pass the user ID(s) to a different search where I can look at 7 days worth of their authentication activity to see if the geolocation matches?  I've researched sub-searches but that doesn't work because I need the user ID first but the subsearch runs first and I don't have the user ID yet.  I looked at map which seems like it's the best solution, but there a lot of warnings about it being resource intensive.  If anyone can point me in the right direction, it would be very much appreciated.     index=okta eventType="user.mfa.factor.update" | stats values(actor.id), values(client.geographicalContext.State)