All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

I'm creating an Ansible playbook for installing the UF in our org, and I discovered being able to use user_seed.conf for the initial --accept-license call, but now I am wanting something similar when... See more...
I'm creating an Ansible playbook for installing the UF in our org, and I discovered being able to use user_seed.conf for the initial --accept-license call, but now I am wanting something similar when running a subsequent ./splunk install app <path to SPL file> -auth <username:passwd> Can I use the hashed password value here or maybe call the user_seed.conf file again?   Thanks!
I am trying to route metric type events to a null queue to avoid indexing them but they are still coming through.  Any ideas if there is a special way to do this?   props.conf: [azr_proda_metrics]... See more...
I am trying to route metric type events to a null queue to avoid indexing them but they are still coming through.  Any ideas if there is a special way to do this?   props.conf: [azr_proda_metrics] TRANSFORMS-set= kubenullmetrics   transforms.conf: [kubenullmetrics] REGEX=metric_name=kube.cluster.cpu.request| metric_name=kube.cluster.memory.request DEST_KEY=queue FORMAT=nullQueue
Previously, I added user in controller and the role is automatically assigned as "tenant role". I tried to add another one but this time it's "tenant role" is not automatically assigned. Can I add mu... See more...
Previously, I added user in controller and the role is automatically assigned as "tenant role". I tried to add another one but this time it's "tenant role" is not automatically assigned. Can I add multiple users w/ tenant role?
Hi Guys ,    I have a query running in this job ID on databricks:   And , everytime when I try to transport these 5 rows from Databricks into Splunk running in this job 18363943 , it only ret... See more...
Hi Guys ,    I have a query running in this job ID on databricks:   And , everytime when I try to transport these 5 rows from Databricks into Splunk running in this job 18363943 , it only returns just 1 one row at all: SPL to transport data from Databricks: | databricksjob job_id="18363943" | eval event_name = "Fraude - risco na selfie", severity="High", source = "DataBricks", jira_update_comment = " " | table-result  event_name , severity, consumer_id,biometric_origin,score, source, jira_update_comment Results with only one row: Could you guys help me with this solution or show me where I'm making mistakes writting the code? I need a script that returns these 5 rows. Thanks for advance.
Hi, I was wondering if anyone is auto-blocking malicious IPs using the 'Alert Action' or using any other method. We have Cisco FMC and are thinking of using the REST API to block the IPs. I would a... See more...
Hi, I was wondering if anyone is auto-blocking malicious IPs using the 'Alert Action' or using any other method. We have Cisco FMC and are thinking of using the REST API to block the IPs. I would appreciate it if anyone has achieved this and can share how you are doing this. Thanks!
Hello there, Can someone explain to me why there is a second "average" when I hover one slice of the pie chart? The first "average" is my calculation, the second with the % ("average%") came ou... See more...
Hello there, Can someone explain to me why there is a second "average" when I hover one slice of the pie chart? The first "average" is my calculation, the second with the % ("average%") came out of nowhere and I don't know why they have different results. Can i get rid of it? In case you need my search :     index=blabla | stats count by category | eventstats sum(count) as total | eval average=round((count/total)*100,2) | sort 10 - average | fields category average     Thanks.
We have several servers succesfully forwarding eventlogs to our on prem splunk server. No one can remember the credentials when installing the forwarder. What is the best way to handle this problem w... See more...
We have several servers succesfully forwarding eventlogs to our on prem splunk server. No one can remember the credentials when installing the forwarder. What is the best way to handle this problem without breaking forwarding on the other servers? Thanks    
Hi All I am using an app called Murex, I am Admin on the environment but i cant see the Sharing (permissions) column on this app. On all other apps I can see the permissions, but not on this one? An... See more...
Hi All I am using an app called Murex, I am Admin on the environment but i cant see the Sharing (permissions) column on this app. On all other apps I can see the permissions, but not on this one? Any ideas anyone? for example in another app with the same user.    
 In above image i couldn’t able to access the date input,It’s actually a client server as user I couldn’t able access it.please let me know how to enable the input field that user can access   ... See more...
 In above image i couldn’t able to access the date input,It’s actually a client server as user I couldn’t able access it.please let me know how to enable the input field that user can access   thank you veeru
Hello,  This is regarding https://splunkbase.splunk.com/app/4283/#/details  Can someone pls advise how to configure the Auto cache update ?   Where in ES should i enable "Cache auto update" and what... See more...
Hello,  This is regarding https://splunkbase.splunk.com/app/4283/#/details  Can someone pls advise how to configure the Auto cache update ?   Where in ES should i enable "Cache auto update" and whatever has been mentioned in the below steps ?
My data is like this illustration purposes only: LocalIp  aip 10.10.10.1 192.168.1.1 10.10.10.2 172.58.100.41 10.10.12.3 8.8.8.8 192.168.3.1 8.8.8.8   I am trying to search ... See more...
My data is like this illustration purposes only: LocalIp  aip 10.10.10.1 192.168.1.1 10.10.10.2 172.58.100.41 10.10.12.3 8.8.8.8 192.168.3.1 8.8.8.8   I am trying to search for any hits where LocalIP contains the aip address. In this example there is one hit This is what I have but stuck at trying contains | eval result=if(like(LocalIP, "%".aip."%"),"Match","")    
Hello all, I'm am new to Splunk and installed the free Enterprise version to start learning to expand my skill set. I am able to install Splunk locally and monitor files on the computer it is instal... See more...
Hello all, I'm am new to Splunk and installed the free Enterprise version to start learning to expand my skill set. I am able to install Splunk locally and monitor files on the computer it is installed on. However I am now wanting to try to monitor a remote computer. I have set up a test VM and was going to install the Universal Forwarder when it asked me for my Receiving Indexer. Obviously I cannot input the 127.0.0.1 for the IP, so I tried changing the IP where the Splunk server is running. Per the Splunk documentation, I changed the mgmtHostPort line in the web.conf from 127.0.0.1:8089 to 10.xx.xx.xx:8089. I also added the SPLUNK_BINDIP=10.xx.xx.xx to the splunk-launch.conf file. After doing this, I tried to restart Splunk and it timed out due with a entry in the log, "Could not bind to ip 10.xx.xx.xx port 8089". Ok - so I reverted all my changes to their default configuration and now when I try to log into Splunk, I get "500 Internal Server Error". Everything is as it was when it was first installed and I could log in, and I've also tried 3-4 times restarting the Splunk service on my PC. This is a Windows installation p.s. Any ideas? This happened last week and the only thing I could do to fix it was uninstall and reinstall Splunk. Is that the only fix for when Splunk acts up? Thanks!
Hello,  I would like change bare host name to host name with a domain name. According to all articles I have changed the following configuration files using CLI and manual methods:  ./splunk set se... See more...
Hello,  I would like change bare host name to host name with a domain name. According to all articles I have changed the following configuration files using CLI and manual methods:  ./splunk set servername nazwahosta.domena.koncowka, ./splunk set default-hostname and added to $Splunk_home/etc/system/local/deploymentclient.conf [deployment-client] clientName = host.domain.name Afterwards - instance name and client name changed into version with domain name but host name didn't. I am using deployment server and found that someone had a similar problem (but with no solution): Event from add-on Splunk app Windows source withou... - Splunk Community I bet that the problem lies somewhere in Splunk_TA_windows app props or conf file but can't find where exactly.  Does anybody know where is the problem? Have a nice day!
KPI GLOBAL LOCAL random1 random_data random_data random2 random_data random_data random3 random_data random_data I have a dashboard like the above i want to design a condi... See more...
KPI GLOBAL LOCAL random1 random_data random_data random2 random_data random_data random3 random_data random_data I have a dashboard like the above i want to design a conditional drilldown where : when someone clicks on any value(random_data) in the global column they must be redirected to a different page in a new tab when they click on any value(random_data) in the local column they must be redirected to a different page in a new tab is there any way to achieve this?
Hi Team,   Do we have IntelliSense editor support in Phantom Playbook editor in the browser, OR can we integrate existing phantom instance into VSCode to develop playbook python code using intellig... See more...
Hi Team,   Do we have IntelliSense editor support in Phantom Playbook editor in the browser, OR can we integrate existing phantom instance into VSCode to develop playbook python code using intelligent suggestions. and test/execute it in the phantom debugger or vscode debugger. 
While most Warn and Errors show up on the Job dropdown (1) some are also displayed in an area right below the search bar (2). Looking at HTML this placeholder is named search-searchflashmessages ... See more...
While most Warn and Errors show up on the Job dropdown (1) some are also displayed in an area right below the search bar (2). Looking at HTML this placeholder is named search-searchflashmessages What's the name for this area ( to discuss this with Support ) ? Is it possible to config which messages to show/not show in here ? Looking at documentation this area is not detailed: https://docs.splunk.com/Documentation/Splunk/8.2.4/Search/WhatsinSplunkSearch
hi I must add an html link in my dashboard which is an http url But in this url there is the character & so when I want to add it, splunk says "invalid character entity" how to avoid this please?
Hi All I have a sourcetype in which we have some events with a keyword like asdf. In some events it comes in between and some events at the end. I need to forward all these logs to another sourcety... See more...
Hi All I have a sourcetype in which we have some events with a keyword like asdf. In some events it comes in between and some events at the end. I need to forward all these logs to another sourcetype with props and transforms. [generic_sourcetype_routing_asdf] REGEX =  DEST_KEY = MetaData:Sourcetype FORMAT = sourcetype::asdf_logs props.conf [current_sourcetype] TRANSFORMS-sourcetype_routing = generic_sourcetype_routing_asdf In the REGEX part I would like to know if only keeping asdf or *asdf * would work. I can't put the regex for complete log format since there are multiple formats. So I need to inform splunk to pass any event with asdf anywhere in it should be forwarded to the new one. Please suggest. Thanks Maria Arokiaraj  
I have this weird issue where the same exact search, run for a same exact period returns different number of events each time it is run. Thus, rendering all attempts for accurate reporting obsolete.... See more...
I have this weird issue where the same exact search, run for a same exact period returns different number of events each time it is run. Thus, rendering all attempts for accurate reporting obsolete. It doesn't matter the type of search, for instance, if it has some statistics or it's just plain search - same searches return different results. We've checked all the usual stuff - event sampling is turned off, indexing time is OK and it's not lagging, so no skewing of the results can come from this. Searches are run directly against indexes, no data models are involved and search logs for the searches are identical for the runs compared to each other. What we discovered for sure is, that this issue affects only indexes that are stored in an S3 Storage. Locally kept indexes are fine and do not have this issue. The S3 storage was tested, it is configured correctly, there are no network disruptions, there are no errors in the logs concerning it, there's nothing that could hint a problem. Yet, the problem remains. Any idea what may be causing this? Attaching a screenshot just for visualization, and here's the search for which it was made:     index="qualys" sourcetype="qualys:hostDetection" PATCHABLE="YES" NETBIOS="*"​      
Hello there, I want to make a top 10 of applications based on top 10 of categories. Here is an example: Category Nb of alert / category Application Nb of alert (by app for this category) ... See more...
Hello there, I want to make a top 10 of applications based on top 10 of categories. Here is an example: Category Nb of alert / category Application Nb of alert (by app for this category) Cat1 8000 App1 1000   8000 App2 100   8000 App3 10 Cat2 5000 App1 10000   5000 App2 688 Cat3 300 App4 4560 So I know how to get the top 10 categories but from that I don't know how to get the top 10 applications for each category found previously. Here is what i've done so far:  (note that the 2nd column in my example doesn't exist in my query, it's just to make the example clearer)       index=my_index action=block [search index=my_index action=block | top category | table category] | stats count by category, app | stats values(app) AS apps, values(count) AS total by category       It gives me the 10 categories but they are sorted by alphabetic order instead of by number of block action and I have more than 10 applications on the second column, not sorted. Does anyone has a solution for that? It'd be lovely. Thanks in advance.