All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi,  I have missed DB collector credential while re-installing controller and i have back file of older controller folders. Kindly let me where can i find those DB collector configuration file in o... See more...
Hi,  I have missed DB collector credential while re-installing controller and i have back file of older controller folders. Kindly let me where can i find those DB collector configuration file in older controller folder. thanks
Hello - What version of Java/JDK is AppDynamics licensed to use with their software WRT to agents?  There's some concern with Oracle lawyers going after organizations using their Java JDK software. ... See more...
Hello - What version of Java/JDK is AppDynamics licensed to use with their software WRT to agents?  There's some concern with Oracle lawyers going after organizations using their Java JDK software.  Does AppDynamics have a license/agreement with Oracle?  Can we use OpenJDK, or Corretto instead? Thanks.
Hi Team, i have one abc.csv file with  only one colunm as Source_IP where values are in10.10.10.0/24 format . next i have  index=xyz which has multiple column as dst,city,counrty , src is one of ... See more...
Hi Team, i have one abc.csv file with  only one colunm as Source_IP where values are in10.10.10.0/24 format . next i have  index=xyz which has multiple column as dst,city,counrty , src is one of the  column . here i need all data from index=xyz where Source_IP from abc.csv matches with src column of index=xyz. i have uploaded the file successfully but unable to find the relevant query to fetch data ..    
This is my first post here! _I am new and I am learning Hi Experts, I have data like below coming into a csv file. ref1 toref1 16YcK36 bc46 20Sdj60 fg64 13Nbc46 ... See more...
This is my first post here! _I am new and I am learning Hi Experts, I have data like below coming into a csv file. ref1 toref1 16YcK36 bc46 20Sdj60 fg64 13Nbc46 dj60 15Nfg64 nf32 13Tnf32 cK36     and my end result, I would like the table to be like below: (Edited: My search should be sorted (column no 2) - should match the last 4 with column 1). Please refer to below table. Thanks in Advance. ref1_tobe toref1_tobe 16YcK36 cK36 20Sdj60 dj60 13Nbc46 bc46 15Nfg64 fg64 13Tnf32 nf32
----------------------- DISK INFORMATION ---------------------------- DISK="/dev/sda" NAME="sda" HCTL="0:0:0:0" TYPE="disk" VENDOR="VMware " SIZE="210G" SCSIHOST="0" CHANNEL="0" ID="0" LUN="0" BOOT... See more...
----------------------- DISK INFORMATION ---------------------------- DISK="/dev/sda" NAME="sda" HCTL="0:0:0:0" TYPE="disk" VENDOR="VMware " SIZE="210G" SCSIHOST="0" CHANNEL="0" ID="0" LUN="0" BOOTDISK="TRUE" DISK="/dev/sdb" NAME="sdb" HCTL="0:0:1:0" TYPE="disk" VENDOR="VMware " SIZE="100G" SCSIHOST="0" CHANNEL="0" ID="1" LUN="0" BOOTDISK="FALSE"   My log (multiline event) looks like this but Splunk is automatically extracting just the first line . I want to extract all the values.  for example: NAME=sda NAME=sdb     Could someone please help me with it  
host="SPL-SH-DC" sourcetype="csv" source="****"  Severity!="Info" Severity!="low" Plugin_Name!="SSL Certificate with Wrong Hostname" Plugin_Name!="Unix Operating System Unsupported Version Detect... See more...
host="SPL-SH-DC" sourcetype="csv" source="****"  Severity!="Info" Severity!="low" Plugin_Name!="SSL Certificate with Wrong Hostname" Plugin_Name!="Unix Operating System Unsupported Version Detection" Plugin_Name!="SSL Self-Signed Certificate" Plugin_Name!="SSL Certificate Cannot Be Trusted" Port!="8089" Port!="6502" | table IP_Address,device_name,Plugin_Name, Severity,model, Protocol, Port, Exploit, Synopsis, Description, Solution, See_Also, CVSS_V2_Base_Score, CVE,Plugin Thanks for your help!
I am looking to format ldap extracted distinguishedName to a domain. Example CN=Username,OU=Folder,OU=Folder,DC=domain,DC=com Output domain.com
Hi there all. I am in a bit of a catch 22.  I have a process that cannot send data over HTTPS data because the HEC is using a self-signed certificate and the process I am using will not allow that. ... See more...
Hi there all. I am in a bit of a catch 22.  I have a process that cannot send data over HTTPS data because the HEC is using a self-signed certificate and the process I am using will not allow that.  However, I cannot send HTTP because the HEC is set for HTTPS input and so is getting rejected by the Splunk HEC. Is there a way to have the HEC collect BOTH HTTP and HTTPS and set the requirement based on the input? Thanks
Hi everyone, i have in a table the result of a scanning script. Of course, the cells are much too large. Is there a way to minimize them and maximize them if necessary? A drill down to a new page w... See more...
Hi everyone, i have in a table the result of a scanning script. Of course, the cells are much too large. Is there a way to minimize them and maximize them if necessary? A drill down to a new page would be also ok, but how can I shorten or change the text in the cell so that the drilldown function is still possible since I use "clickvalue".  
Hi All, I am working on Splunk cloud classic and got a request to onboard the MySQL server database logs to splunk. I have gone through the documentation and aware of creating the identity, conne... See more...
Hi All, I am working on Splunk cloud classic and got a request to onboard the MySQL server database logs to splunk. I have gone through the documentation and aware of creating the identity, connection and input. Q1. where do I place these configurations, in heavy forwarder or on splunk cloud. Q2.From where do I get the JRE path and where do I install the JDBC drivers?As it's a cloud environment I am quite confused about this and we are not allowed to change any configurations using the web UI everything is done using the configs file in bitbucket. Q3: How do I setup the server class for this? Thankyou.
We are getting /var/log files monitored from the endpoints and sent to Splunk using syslog-ng on a single TCP port. Now when we see the vents in Splunk its combination of all the /var/log/secure, /va... See more...
We are getting /var/log files monitored from the endpoints and sent to Splunk using syslog-ng on a single TCP port. Now when we see the vents in Splunk its combination of all the /var/log/secure, /var/log/messages etc. into a single index and syslog source type. How can I identify just the /var/log/secure of out it and send to a other index from Splunk side? I am trying make use of props like below but not sure what the regex would be for identifying just /var/log/secure. Any help is appreciated. ####props [linux_secure] SOURCE_KEY = _raw REGEX = ***Need REX for /var/log/secure events**** DEST_KEY = _MetaData:Index FORMAT = abc_index
I need to search using the input from csv and compare the results with the same csv containing two columns - and show the difference between them (accountname present and accountname absent) eventc... See more...
I need to search using the input from csv and compare the results with the same csv containing two columns - and show the difference between them (accountname present and accountname absent) eventcode=4768 contains Account_Name in NTID format eventcode=4769 contains Account_Name in UPN format index=<index_name> host=<host_list> EventCode=4768 OR EventCode=4769 [| inputlookup accountname.csv] | dedup Account_Name | table Account_Name, Ticket_Encryption_Type, Supplied_Realm_Name, Service_Name,Service_ID how do I make the results from above query to show the difference? Appreciate the help. Thanks
Hello everyone, I would like to ask if the following architecture is feasible to be build and to be functional: - Windows Domain with 200 Endpoints having UF installed. Endpoints collect host log... See more...
Hello everyone, I would like to ask if the following architecture is feasible to be build and to be functional: - Windows Domain with 200 Endpoints having UF installed. Endpoints collect host logs. - Heavy Forwarder collects all data from the UFs. - Same HF acts as an intermediate forwarder and forwards raw logs received to a Remote Indexer, outside the Windows Domain. - Remote Indexer is a Search Peer/Deployment Client of a Search Head/Deployment Server where Splunk ES is installed. Questions: 1. Is it possible for Splunk HF to be also a Deployment Server and manage the UFs on Endpoints? 2. Is HF a must for collecting data from 200 Endpoints and re-forwarding them to Indexer? Or a Splunk UF can easily do the job too with minimal footprint? 3. HW will not be directly connected with Splunk License Master (Search Head with ES installed). Can I install a license and set it as a License Slave? Thank you in advance. With kind regards, Chris
how to check the transfer speed from UF to indexer ?   is it possible to check by events or source ?
I am trying to use the Splunk Addon for New Relic v2.2.0, and I keep getting errors. I think the New Relic API has changed slightly, and I tried to edit the modalert python file, yet I'm still gettin... See more...
I am trying to use the Splunk Addon for New Relic v2.2.0, and I keep getting errors. I think the New Relic API has changed slightly, and I tried to edit the modalert python file, yet I'm still getting errors such as: 02-22-2022 04:52:01.962 -0500 ERROR sendmodalert - action=alerts_to_newrelic STDERR - NameError: name 'basestring' is not defined 02-22-2022 04:52:01.962 -0500 ERROR sendmodalert - action=alerts_to_newrelic STDERR - if isinstance(self.sid, basestring) and 'scheduler' in self.sid: 02-22-2022 04:52:01.962 -0500 ERROR sendmodalert - action=alerts_to_newrelic STDERR - File "/opt/splunk/etc/apps/Splunk_TA_New_Relic/bin/splunk_ta_new_relic/cim_actions.py", line 124, in __init__   We are on Splunk 8.1.7. Thanks! Stephen
Hi everyone, There are 10 single value graphs on my Dashboard. I don't want to use global time Range. How can I add for each?
Hi everyone, I need help in figuring out a way to use my report (table data) into calculations in my dashboard panel. I have a report that runs on daily basis and calculates avg response time of ser... See more...
Hi everyone, I need help in figuring out a way to use my report (table data) into calculations in my dashboard panel. I have a report that runs on daily basis and calculates avg response time of servers by environments (app name say ABC, def and xyz). Now I want to use this response time as an input to one of my panel's back end search. So report data is like below app name   response time       1) ABC           0.234 sec 2) def            0.113 sec 3) xyz            0.227 sec I want to use this response time to build gauge in my dashboard panel. I have added this report in my dashboard panel that gives in a search ref tag but I don't know how to use this further.  
Hello, Have not been able to find any current useful information regarding sending logs from HP-UX 11.11 and 11.31 to Splunk. Is it at all supported? Does anyone know if possible, if yes how and f... See more...
Hello, Have not been able to find any current useful information regarding sending logs from HP-UX 11.11 and 11.31 to Splunk. Is it at all supported? Does anyone know if possible, if yes how and for which Splunk version? Thank you
I want to add another title next to "UIP" on the apps bar! Settings-->User Interface-->Navigation Menus--> <nav search_view="search"> <view name="search" default='true' /> <view name="datasets" /... See more...
I want to add another title next to "UIP" on the apps bar! Settings-->User Interface-->Navigation Menus--> <nav search_view="search"> <view name="search" default='true' /> <view name="datasets" /> <view name="reports" /> <view name="alerts" /> <view name="dashboards" /> <collection label="UIP"> <view name="login_name"/> <view name="agent"/> <view name="hase_dashboard"/> <view name="hase_uip_data_search"/> </collection> <collection label="CIVR"> <view name="IVR-CC"/> <view name="IVR-CC3"/> </collection> </nav>  
I used to use the tokenlinks.js from the simple xml dashboard examples. Copied the file into appserver/static of my own app, add the script="tokenlinks.js" and all works. For some reason that no lo... See more...
I used to use the tokenlinks.js from the simple xml dashboard examples. Copied the file into appserver/static of my own app, add the script="tokenlinks.js" and all works. For some reason that no longer works. I have downloaded the dashboard examples app, copied the dashboard XML shown in the docs for the Custom Token Links example. Copied the JS shown in the gui into the appserver/static/tokenlinks.js into my own app, but the JS does not seem to get called and the dashboard does not do what it does in the Example Dashboard app. So, I have a working dashboard examples app, but not my own app. I see that the tokenlinks.js in appserver/static for the dashboard examples is now >400K and is very different to the original. It seems to be some webpack related stuff. Any idea what I am doing wrong?