All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

I am giving the username@accountname and password while accessing the Rest url of metric browser from browser. I am getting 401(un authorized ) error I am trying like below: username: cat******@c... See more...
I am giving the username@accountname and password while accessing the Rest url of metric browser from browser. I am getting 401(un authorized ) error I am trying like below: username: cat******@cat****** password: cat**** Could some one please help me.
Hello, I have 3 rows with numeric data, trying to visualize this in a pie chart. The first value (totalval) is the total value I want to the other values to be a percentage of the total value ... See more...
Hello, I have 3 rows with numeric data, trying to visualize this in a pie chart. The first value (totalval) is the total value I want to the other values to be a percentage of the total value and so only show the 2 other values (typeA and typeB) type           total --------------------- totalval    4151 typeA       1442 typeB        17 Trying for some hours, i am stuck, any help is appreciated Regards, Harry
Can I repoint universal forwarder to new heavy forwarder in windows without reinstalling the agent?  
Supposed if i have huge data of users i need to check the last status of the each users Like login and logout. If user have last status as log out i need to show user info in the table format with st... See more...
Supposed if i have huge data of users i need to check the last status of the each users Like login and logout. If user have last status as log out i need to show user info in the table format with status sign out 
Dear Splunk Community, I have the following query. The main query looks for errors in certain log files. If they are found, an list of events is returned. The RUNID is fetched from the events and is... See more...
Dear Splunk Community, I have the following query. The main query looks for errors in certain log files. If they are found, an list of events is returned. The RUNID is fetched from the events and is used in the JOIN to fetch profiles that are related to the events. Not all events from the main search have a profile. In that case, the result will be all events from the main search with empty profile collumns. I do not wish to see those events. Example: I have 10 events that show errors. 5 of these events have no profile. An event with no profile looks like this: And an event with a profile looks like this: My question is: How do I exclude events with no profiles attached to it? I want to get rid of the entire row if no profile is found. How do I achieve this/ index="myIndex" host="myHostname1*" OR host="myHostname2*" source="/opt/IBM/taddm/dist/log/sensors/*/*.log" CTJTD3028E | table _time, errorcode, IP, runid, profile, _raw | rex "(?<errorcode>CTJT\w{6})" | rex field=_raw "(?<runid>\w{16}#)" | eval runid = replace(runid,".$","") | eval _time=strftime(_time,"%d/%m/%Y %H:%M:%S") | rex field=_raw "(?<IP>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})" | rex field=_raw "CTJTD3028E(?<_raw>.+)" | rename errorcode AS "Foutcode" | rename _raw AS "Foutmelding" | rename runid AS "RUNID" | rename _time AS "Datum" | dedup Foutcode, IP | join type=left RUNID [ search index="myIndex" host="myHostname1*" OR host="myHostname2*" source="/opt/IBM/taddm/dist/log/services/ProcessFlowManager.log" OR source="/opt/IBM/taddm/dist/log/services/ClientProxy.log" "started with profile" myProfileName | rex field=_raw "Discovery\srun,\s(?<RUNID>[^\s]+)\sstarted\swith\sprofile\s(?<profile>[^\s\r]+)" | stats count by profile RUNID | fields profile RUNID] | rename profile AS "Profiel"  
Hi Team,   could you please help to get below query: I  have 2 lookup files. I want to fetch uncommon data from 1 of the lookup file. e.g. 1st Lookup file - abc.csv ID Name 1 abc 2 xyz 2nd L... See more...
Hi Team,   could you please help to get below query: I  have 2 lookup files. I want to fetch uncommon data from 1 of the lookup file. e.g. 1st Lookup file - abc.csv ID Name 1 abc 2 xyz 2nd Lookup file PQR.csv ID NAme 1 abc   I want to fetch below uncommon data   output :  ID NAme 2 xyz   Kindly help to get this.   Thanks. ND  
Hi How can I extract duration with below condition? (it is important to check these condition to find correct match) 1)A=A+10 2)B=B FYI: AFAIK stat command is faster than transaction command. I w... See more...
Hi How can I extract duration with below condition? (it is important to check these condition to find correct match) 1)A=A+10 2)B=B FYI: AFAIK stat command is faster than transaction command. I want to extract duration in large dataset. Here is the log: 2022-01-17 00:14:19,600 INFO CUS.AbCD-APP1-12345 [PacketSendSuccess] Normal Packet Received: A[000] B[9999] C[000000] 2022-01-17 00:14:20,622 INFO CUS.AbCD-APP1-12345 [PacketSendSuccess] Packet Processed: A[010] B[9999] 2022-01-17 16:50:48,383 INFO CUS.AbCD-APP1-54321 [PacketSendSuccess] Normal Packet Received: A[900] B[33322] 2022-01-17 16:50:48,414 INFO CUS.AbCD-APP1-54321 [PacketSendSuccess] Packet Processed: A[910] B[33322] C[000000] expected output: name                                                    duration CUS.AbCD-APP1-12345      1.022 CUS.AbCD-APP1-54321       0.031 Any idea? Thanks
What is    "NodeType " terms in kafka_consumer and kafka_producer  with splunk otel collector setup . I have done  the setup with zookeeper.     link : https://docs.splunk.com/Observability/gdi/... See more...
What is    "NodeType " terms in kafka_consumer and kafka_producer  with splunk otel collector setup . I have done  the setup with zookeeper.     link : https://docs.splunk.com/Observability/gdi/collectd/collectd-kafka-consumer.html
Hi, We are using Splunk Cloud and DBConnect App is installed on IDM. I have noticed that some of the DB Inputs stop indexing data after Splunk Cloud Monthly Maintenance Activity. I first observed t... See more...
Hi, We are using Splunk Cloud and DBConnect App is installed on IDM. I have noticed that some of the DB Inputs stop indexing data after Splunk Cloud Monthly Maintenance Activity. I first observed this on 22nd Dec - DBConnect version was 3.4.2 DBConnect was upgraded to 3.7.0 on 4th Jan and again after the Splunk Cloud Maintenance Activity on 10th Jan, some of the DB Inputs have stopped indexing data. Can someone please suggest if this is an expected behavior for some specific types of DB Inputs (if yes, what?) and/or what logs I could check to analyze this issue further? We are using MySQL and SQL Server DB Inputs. Thank you very much. Regards, Madhav
Hello Splunkers, for our email alerts i want a custom footer, but it seems no linebreak works. i already tried \ like it is in the standard footer, \r\n and just pressing enter and shift + enter. ... See more...
Hello Splunkers, for our email alerts i want a custom footer, but it seems no linebreak works. i already tried \ like it is in the standard footer, \r\n and just pressing enter and shift + enter. If it matters, i use the config explorer for that in Splunk Enterprise 8.2.0. thanks for help
I have been getting this email notification every week, and went to "Upgrade Readiness App" to see what is going on. I saw one of the app "Data Manager" is failing. I also went in and request to upgr... See more...
I have been getting this email notification every week, and went to "Upgrade Readiness App" to see what is going on. I saw one of the app "Data Manager" is failing. I also went in and request to upgrade to Python 3 for more than two weeks, but still we are getting the notification every week, and also it is not being changed. Can someone guide us what needs to do? Thanks in advance. 
I have a dashboard where I tried adding <caption> tag to the table visualization through source code xml , but it says " unknown node <caption>  Node <caption> is not allowed here" hence it isn't ide... See more...
I have a dashboard where I tried adding <caption> tag to the table visualization through source code xml , but it says " unknown node <caption>  Node <caption> is not allowed here" hence it isn't identified in dashboard xml . For example, adding caption to a table with title "Builds"   But I need to add captions for Screen reader purposes, Is there any way to add it via Javascript ; like manipulating using {table-id}? 
Hi,Splunkers, I have a dashboard with 2 Panels, which share one droplist  input. droplist has  name/values  as  ALL/*,     a/a, b/b, c/c, etc. for panel 1, whatever is selected,      | search  fie... See more...
Hi,Splunkers, I have a dashboard with 2 Panels, which share one droplist  input. droplist has  name/values  as  ALL/*,     a/a, b/b, c/c, etc. for panel 1, whatever is selected,      | search  fieldname = $tokename$,  but for panel 2, when ALL/* selected,   |search fieldname = $tokenname$ as panel1, but when other values are selected,  Iwant a  suffix  _CB  to be added at the end, for example, when   a/a selected,   search should be built like |search fieldname=a_CB. thx in advance.   Kevin  
The current versions of each App are listed below. Splunk App for AWS: 6.0.3 (latest version) Splunk Add-on for AWS: 5.2.0 (latest version) The release notes for 6.0.3 (latest version) of "Splunk ... See more...
The current versions of each App are listed below. Splunk App for AWS: 6.0.3 (latest version) Splunk Add-on for AWS: 5.2.0 (latest version) The release notes for 6.0.3 (latest version) of "Splunk App for AWS" state that it is possible with 5.0.0-5.0.4 of "Splunk Add-on for AWS". Is it compatible with the latest version (5.2.0) of "Splunk Add-on for AWS"? If we want to use the latest versions of both, do I have to use the following combinations? Splunk App for AWS: 6.0.3 (latest version) Splunk add-on for AWS: 5.0.4 We know that support will end on 2022/7. We are filled with sorrow still now. Best Regards.
On ES am getting warning messages the " two assets are exceeding the field limits set in the asset & identity management page". It says that this might cause performance issues & the field limits nee... See more...
On ES am getting warning messages the " two assets are exceeding the field limits set in the asset & identity management page". It says that this might cause performance issues & the field limits need to be increased. How do I increase the field limits please? Thx a million for your help in advance.
Can someone help me to get ServiceNow to create an event ticket every time my Splunk alert gets triggered? I had followed these steps below in this screenshot but I have not been able to get anywhere... See more...
Can someone help me to get ServiceNow to create an event ticket every time my Splunk alert gets triggered? I had followed these steps below in this screenshot but I have not been able to get anywhere with this.  Im getting the Splunk alerts when the alert is triggered. However, ServiceNow is not creating an event when this is happening.  That is the issue.  If anyone can point me in the right direction I would really appreciate it!    
Please, how do I set up Azure nsg logs on Splunk clouds? Please, does anyone have any material on that?
Hi all, I'm trying to create a blacklist for an event after checking 2 different fields on different lines. I can get them filtered individually, but without an "AND" operator, like OR has "|", I'... See more...
Hi all, I'm trying to create a blacklist for an event after checking 2 different fields on different lines. I can get them filtered individually, but without an "AND" operator, like OR has "|", I'm struggling.     Sample Event     An account was successfully logged on. Subject: Security ID: NULL SID Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: No Elevated Token: Yes Impersonation Level: Impersonation New Logon: Security ID: SYSTEM Account Name: COMPUTER$ Account Domain: XXXX.NET Logon ID: 0x6C6C65F09 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {970e0bf8-ccc7-18fd-7be9-d5efe2ab8b22} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Kerberos Authentication Package: Kerberos Transited Services: - Package Name (NTLM only): - Key Length: 0       So what I'm trying to do is filter on Logon Type=3 AND Account Name: xxx$   I have tried stuff that works on regex101, etc.  And it will work there, but Splunk doesn't seem to recognize it.     (?=.*?(Logon\sType:[\s]*3))(?=.*?(Account\sName:[\s]*.*\$))     Any help is appreciated  
I have been trying to figure out why this doesn't work. |inputlookup ioc_domain.csv | table query | search NOT [inputlookup ioc_domain.csv | table query]   Obviously the above is a useless query b... See more...
I have been trying to figure out why this doesn't work. |inputlookup ioc_domain.csv | table query | search NOT [inputlookup ioc_domain.csv | table query]   Obviously the above is a useless query but I think the reason it won't work is the same reason my query wont' work which is basically |tstats count where index=dns by PREFIX(query=) PREFIX(srcip=) | rename *= AS * | search NOT [inputlookup ioc_domain.csv | table query] It's not that exactly but close enough. The main part of the search works fine, if I search without the exclusion everything goes as expected. If I try and use a set of values from a field in a lookup table to act as a filter of events not to include it doesn't work no matter what I try. I've tried in the subsearch piping to: | rename field AS search | format], I 've tried just | table field], I've tried using return. Nothing seems to work.  Although it seems to work if the subsearch before any other pipe command, but I'm not interested in that I'm trying to convert some alerts to using tstats and need to be able to scrub against a lookup table. For more info, I'm not using tstats against datasets or datamodels, this is against indexes. Anyone have any ideas
Im trying to test a Splunk Cloud integration my company has written with a Splunk Cloud free trial. The trial uses a self signed cert, which is not allowed in a down stream service. Is it possible t... See more...
Im trying to test a Splunk Cloud integration my company has written with a Splunk Cloud free trial. The trial uses a self signed cert, which is not allowed in a down stream service. Is it possible to update the cert on the trial account? I can only find docs for Enterprise.  If not does the paid cloud service use a self signed cert?   Thank you.