All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi there! I have a server that will be down for sometime, and I would like to not be inundated with "missing forwarder" alerts.  Is there a way to "pause" that alert for just that server?   Thanks... See more...
Hi there! I have a server that will be down for sometime, and I would like to not be inundated with "missing forwarder" alerts.  Is there a way to "pause" that alert for just that server?   Thanks in advance!
Tab1 Tab2 Tab3 Tab4 Tab5 _time 200 200 200 200 200 timestamp value 200 200 200 200 200 timestamp value   the above data i'm getting from an index which has json data afte... See more...
Tab1 Tab2 Tab3 Tab4 Tab5 _time 200 200 200 200 200 timestamp value 200 200 200 200 200 timestamp value   the above data i'm getting from an index which has json data after writing  index = xyz | table Tab*,_time Tab1 Tab2 Tab3 Tab4 Tab5 _time reltime 200 200 200 200 200 timestamp some hours ago the above table i'm getting after adding | sort - _time | head 1| reltime   to the above query then i'm doing transpose column_name=Application_list | rename 'row 1' as Status  | eval status = if((Status=200),"up","down) is there any way to retain the reltime column to the above table after transposing it because i'm getting below output? application_list Status Tab1 up Tab2 up Tab3 up Tab4 up Tab5 up reltime down _time down   and i want it like application_list Status reltime Tab1 up x hours ago Tab2 up x hours ago Tab3  up x hours ago Tab 4 up x hours ago Tab 5 up x hours go     below is the whole query: index = xyz | table Tab*,_time | sort - _time | head 1| reltime | transpose column_name=Application_list | rename 'row 1' as Status  | eval status = if((Status=200),"up","down)
I have an index with name applications which contains list of applications: app1 app2 . . . app10 I have created a simple dashboard showing count of events for app1. Is there a way to add pane... See more...
I have an index with name applications which contains list of applications: app1 app2 . . . app10 I have created a simple dashboard showing count of events for app1. Is there a way to add panels using a loop so that I don't have to copy the panel xml code 10 times, once for each app?   <?xml version="1.0" encoding="UTF-8"?> <dashboard> <label>Demo Apps</label> <row> <panel> <single> <title>app1</title> <search> <query>index=appindex (app1) | stats count</query> <earliest>-24h@m</earliest> <latest>now</latest> <sampleRatio>1</sampleRatio> </search> <option name="colorBy">value</option> <option name="colorMode">block</option> <option name="drilldown">none</option> <option name="numberPrecision">0</option> <option name="rangeColors">["0x53a051","0xf8be34","0xdc4e41"]</option> <option name="rangeValues">[0,10]</option> <option name="showSparkline">1</option> <option name="showTrendIndicator">1</option> <option name="trendColorInterpretation">standard</option> <option name="trendDisplayMode">absolute</option> <option name="unitPosition">after</option> <option name="useColors">1</option> <option name="useThousandSeparators">1</option> </single> </panel> </row> </dashboard>    
I have a correlation search created.  However, I want to exclude files from being alerted upon.  I have an lookup file created that has a list of files to be excluded, however when I call that lookup... See more...
I have a correlation search created.  However, I want to exclude files from being alerted upon.  I have an lookup file created that has a list of files to be excluded, however when I call that lookup file to exclude the files, the search results will exclude the whole host and affected files, not just the singular file I want excluded.  My tstats search: | tstats values(Symantec_ICDX.device_public_ip) values(Symantec_ICDX.user_name) values(Symantec_ICDX.file.name) values(Symantec_ICDX.threat.name) values(Symantec_ICDX.type) values(Symantec_ICDX.file.sha2) as Symantec_ICDX.file.sha2 values(Symantec_ICDX.file.path) from datamodel=Symantec_ICDX by Symantec_ICDX.device_name | rename Symantec_ICDX.device_name as dest, values(Symantec_ICDX.device_public_ip) as dest_ip, values(Symantec_ICDX.user_name) as user, values(Symantec_ICDX.file.name) as file_name, values(Symantec_ICDX.threat.name) as threat_name, values(Symantec_ICDX.type) as type, Symantec_ICDX.file.sha2 as file_hash, values(Symantec_ICDX.file.path) as file_path Results of tstat search:   New tstats search with putting in ruby.exe into the lookup file. | tstats values(Symantec_ICDX.device_public_ip) values(Symantec_ICDX.user_name) values(Symantec_ICDX.file.name) values(Symantec_ICDX.threat.name) values(Symantec_ICDX.type) values(Symantec_ICDX.file.sha2) as Symantec_ICDX.file.sha2 values(Symantec_ICDX.file.path) from datamodel=Symantec_ICDX by Symantec_ICDX.device_name | rename Symantec_ICDX.device_name as dest, values(Symantec_ICDX.device_public_ip) as dest_ip, values(Symantec_ICDX.user_name) as user, values(Symantec_ICDX.file.name) as file_name, values(Symantec_ICDX.threat.name) as threat_name, values(Symantec_ICDX.type) as type, Symantec_ICDX.file.sha2 as file_hash, values(Symantec_ICDX.file.path) as file_path | search NOT [| inputlookup exclusions.csv | fields file_name] | search dest=COFGOOPAL2572TW   Results:   Lookup file:    
I have a strange issue where when I run a tstats query against a data model for the last 7 days in smart mode, 24million events are searched. When I run that same search for the last 30 days, only 95... See more...
I have a strange issue where when I run a tstats query against a data model for the last 7 days in smart mode, 24million events are searched. When I run that same search for the last 30 days, only 950k events are searched. This means less results are returned upon completion when last 30 days is selected. Anyone why less events are searched when I expand the time range to last 30 days?
Hello, Anyone else having trouble posting on Answers? Thanks and God bless, Genesius
I'm using the .NET Agent for Windows. It seems the logs are hardcoded to go to "%ProgramData%\AppDynamics\DotNetAgent\Logs" even after redirecting them using the AppDynamicsAgentLog.config, how can I... See more...
I'm using the .NET Agent for Windows. It seems the logs are hardcoded to go to "%ProgramData%\AppDynamics\DotNetAgent\Logs" even after redirecting them using the AppDynamicsAgentLog.config, how can I send them where I actually want them to be?
Hello, We have a clustered environment which collects 2000gb+/day with indexes.conf settings below and the rest of the settings is default. When does the frozenTimePeriodInSecs starts its count? Is... See more...
Hello, We have a clustered environment which collects 2000gb+/day with indexes.conf settings below and the rest of the settings is default. When does the frozenTimePeriodInSecs starts its count? Is it when the data is in the hot, warm or cold buckets? When will the buckets roll from hot to warm, and from warm to frozen in my case? Is it after 90 days since MaxHotSpanSecs default is 90 days? What is the approximate retention time for data with this config? And the maxWarmDBCount = 4294967295 seems really high in this case. See config below: [index_name] homePath = volume:hot_warm/index_name/main/db coldPath = volume:cold/index_name/main/colddb thawedPath = /opt/splunk/indexes/index_name/main/thaweddb maxWarmDBCount = 4294967295 frozenTimePeriodInSecs = 31104000 maxDataSize = auto_high_volume maxTotalDataSizeMB = 4294967295 repFactor = auto   Thanks in advance!
Hello, We have multiple Cisco Switches that are configured to send logs to Splunk.  When comparing the logs on the switch and the logs in Splunk, they do not match up.  Splunk does not seem to catch... See more...
Hello, We have multiple Cisco Switches that are configured to send logs to Splunk.  When comparing the logs on the switch and the logs in Splunk, they do not match up.  Splunk does not seem to catch all of the logs, and seems to miss entries in large chunks, and it does not seem to be any single type of entry.   I've searched by the IP of the switch and the information in the log thinking that it might have been mislabeled, but it is not in Splunk at all. We have our switches set up to log at an informational level.  This is happening across most switches in our environments - not all logs are entering Splunk.   Is this is a known issue? Thanks!
Hello i have a list of events and a fields called ClientDateTime  i want to show the events the their ClientDateTime is 5s between one event to another how can i do it ?
Hi all, Is it possible to configure universal forwarder in one machine that collect logs from all other domain machines rather than installing UF on each machines,   Thanks.
Hello Splunk users For my company internal purpose i needed to publish dashboards to very limited number of users. The limitation was not based on user role, but strictly on ID and I didn't find a ... See more...
Hello Splunk users For my company internal purpose i needed to publish dashboards to very limited number of users. The limitation was not based on user role, but strictly on ID and I didn't find a solution suitable on forums. While tinkering with "depends" based on a couple of posts here  i came up with panels show hide combo with env:user token which I'm sharing right now. Users white list is managed by a simple eval/case statement directly inside dashboard's xml code for fast update. Panels visibility changes based on dropdown input controlled by that eval command. Since I have only basic user role I cannot make any server changes. If you have some idea on how to improve this concept please let me know. (ie. how to use "in" syntax instead of many case options) <form> <label>user_authority_test</label> <fieldset submitButton="false"> <input type="dropdown" token="field1" depends="$user_ok$"> <label>Limited input</label> <choice value="1">Limited visability</choice> </input> <input type="checkbox" token="field2"> <label>Unlimited input</label> <choice value="1">Visible for all</choice> <delimiter> </delimiter> </input> </fieldset> <row depends="$user_not_ok$"> <panel> <title>Message for limited users and/or some other panels</title> <html> <div>Message body</div> </html> </panel> </row> <row depends="$hide$"> <panel> <html> <h2>Debug</h2> <div>authority: $authority$</div> <div>user: $env:user$</div> </html> </panel> <panel> <table> <title>auth</title> <search> <query>|makeresults |eval user="$env:user$" |table user </query> <earliest>-1s</earliest> <latest>now</latest> <done> <!-- insted of user1, user2 etc. add desired user ID --> <eval token="form.authority">case($result.user$=="user1","on", $result.user$=="user2","on", 1=1, "off"</eval> </done> </search> </table> </panel> <panel> <!-- changing visibility of panels based on two step process, eval command modifies value of dropdown. Another token's embedded inside the dropdown controls which panels are visible and which are not You can actually create many sets of values in condition for more felxibility--> <input type="dropdown" token="authority"> <label>authority set</label> <choice value="on">On</choice> <choice value="off">Off</choice> <change> <condition value="on"> <set token="user_ok"></set> <unset token="user_not_ok"></unset> </condition> <condition value="off"> <unset token="user_ok"></unset> <set token="user_not_ok"></set> </condition> </change> </input> </panel> </row> <row depends="$user_ok$"> <panel> <table> <search id="MainSearch"> <query>index=_internal |head 5 |table sourcetype, _time</query> <earliest>-60m@m</earliest> <latest>now</latest> </search> </table> </panel> <panel> <chart> <search base="MainSearch"> <query> |chart c(_time) by sourcetype</query> <progress> <set token="Area_Name">$Area_placeholder$</set> </progress> </search> <option name="charting.chart">pie</option> <option name="charting.chart.sliceCollapsingThreshold">0</option> </chart> </panel> </row> </form>  
Can someone provide the steps to add the TA file on Splunk IDM & Splunk cloud?
Hi Team, I am trying to remove the view permission of a particular user for a dashboard. I want the user should be able to view only 1 dashboard. This worked for the standard dashboard part but ... See more...
Hi Team, I am trying to remove the view permission of a particular user for a dashboard. I want the user should be able to view only 1 dashboard. This worked for the standard dashboard part but in the dash studio though the user was not able to see the data inside the dashboard but was able to see the list of dash studio dashboards. Can anyone help?  What do I need to do so the user can see only the dashboard that I want them to see? Regards, Shubhangi ^ Post edited  by @Ryan.Paredez formatting 
    12/27/21 6:42:50.000 AM PSComputerName Name Memory -------------- ---- ------ Host1 dfdf_Svc.exe 16024 Host1 sssService.exe 1... See more...
    12/27/21 6:42:50.000 AM PSComputerName Name Memory -------------- ---- ------ Host1 dfdf_Svc.exe 16024 Host1 sssService.exe 13142056 Host1 abcservice.exe 31380 Host1 xyzservice.exe 114340 Host1 rrrrr.exe 29304 12/27/21 6:42:50.000 AM PSComputerName Name Memory -------------- ---- ------ Host2 dfdf_Svc.exe 16064 Host2 sssService.exe 13144028 Host2 abcservice.exe 114708 Host2 xyzservice.exe 32248 Host2 rrrrr.exe 33616 I have these splunk output event in splunk logs. 1 event is for one specific server only. Under one server we have 5 services running and associated memory information. These output is in table format. I like to create regular expression so that I can create table format output as below: Servername Servicename Memory(in MB) (since above memory in bytes)    
Hi, I have 6 Alerts that run on a schedule. Only one of them is working. If I run the search results come back that match. Why would they not be triggering?  
Hi i am new to splunk. i have splink event like this " system CPU | 6.039 % | system time | 0.009 % | how can i get avg CPU % usage value against index type ? via report or dashboards.  
Hi, want to create a search to find anyone who does changes to the sAMAccountName  So sAMAccountName could be sAMAccountName=cdf or sAMAccountName=abc sAMAccountName=abc  if anyone changes this t... See more...
Hi, want to create a search to find anyone who does changes to the sAMAccountName  So sAMAccountName could be sAMAccountName=cdf or sAMAccountName=abc sAMAccountName=abc  if anyone changes this to sAMAccountName=abc1 triggers an alert.     
Dear Splunkers, Can you please assist with following problem: We have more 20 UF's installed on windows machines, all of them have deployment server set, and were visible in Forwarder Management.... See more...
Dear Splunkers, Can you please assist with following problem: We have more 20 UF's installed on windows machines, all of them have deployment server set, and were visible in Forwarder Management. But in some time all of them disappeared from FM and are appearing from time to time there. I have tried to delete $SPLUNK_HOME/etc/instance.cfg  on several forwarders and restarted them but problem was not fixed.   Any ideas how to fix it and what can cause such strange behavior?   Regards, Eugene
Hi Team, We could see paloalto network add-on parsing informational messages to alert datamodel (having tag=alert) assigned. Sharing the snap-shot for ref. Can anyone assist me to identify & some bu... See more...
Hi Team, We could see paloalto network add-on parsing informational messages to alert datamodel (having tag=alert) assigned. Sharing the snap-shot for ref. Can anyone assist me to identify & some business justification behind this please. Thanks in advance