All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hello, I have some issues with Field Extraction, since there are some inconsistences in the structure of its field values. If we look at the following 2 sample events:  Amt, outputCd, and returnCd a... See more...
Hello, I have some issues with Field Extraction, since there are some inconsistences in the structure of its field values. If we look at the following 2 sample events:  Amt, outputCd, and returnCd are null in one event and have some values for other event, and also values are within " " . I used following extraction codes which work fine (separately) with null and Values. But we can only use one extraction code to extract field values from the same field. Are there any ways I can write One field extraction code that will satisfy both conditions? Thank you so much, any help will be highly appreciated: Field Extraction Code: outputCd":(?P<outputCd>\w*)  [work with null] Amt":"(?P<Amt>\w*)                      [work with values]   Sample Events "timeStamp":"2021-12-09 08:55:30 EST","appName":"DEV","userType":"DBA","caseStatCd":null,"Amt":"100","errorMsg":null,"eventId":"VIEW_LIST_RESPONSE","eventType":"PENDING","fileSourceCd":null, "mftCd":null,"outputCd":null,"planNum":null,"reasonCd":null,"returnCd":null,"sessionId":"acMgt/dev” , "Period":”2021”, userId":"28f526d4-3464-4766-DBA " "timeStamp":"2021-12-09 08:55:32 EST","appName":"SYS","userType":"ADM","caseStatCd":null,"Amt":null,"errorMsg":null,"eventId":"VIEW_LIST","eventType":"PENDING","fileSourceCd":”09”, "mftCd":null,"outputCd":"09","planNum":null,"reasonCd":null,"returnCd":”01”,"sessionId":"acMgt/dev” , "Period":null, userId":"28f526d4-3464-4766-ADM"
Same as https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503500/thread-id/62002   https://splunkbase.splunk.com/app/1680/ is dep... See more...
Same as https://community.splunk.com/t5/All-Apps-and-Add-ons/Eventtype-errors-using-splunk-app-for-windows-infrastructure/m-p/503500/thread-id/62002   https://splunkbase.splunk.com/app/1680/ is deprecated. What is the solution?
Looking for a device that can monitor power usage that is compatible with splunk. Looking to place it connected to an outlet or something like that to detect if the power goes out in a building or no... See more...
Looking for a device that can monitor power usage that is compatible with splunk. Looking to place it connected to an outlet or something like that to detect if the power goes out in a building or not. I see lots of articles about combining Splunk with smart home products that could do something like this but nobody ever says explicitly what to buy if you want to set it up to do something like that. If anyone has any ideas please let me know
I have duration for multiple websites. How can I get 3 least duration for each websites.  So here is example Duration_in_min website ExtraColumn 10.0 x.com A 2.0 x.com B 2.0 x.c... See more...
I have duration for multiple websites. How can I get 3 least duration for each websites.  So here is example Duration_in_min website ExtraColumn 10.0 x.com A 2.0 x.com B 2.0 x.com AA 3.0 x.com C 4.0 x.com ABC 15.0  Y.com BB 1.0  Y.com CAV 1.0  Y.com XY 3.0  Y.com A 4.0  Y.com B 5.0  Y.com BB    So I only want these rows ( 3 least duration for each website).  Duration_in_min website ExtraColumn 2.0 x.com B 2.0 x.com AA 3.0 x.com C 4.0 x.com ABC 1.0  Y.com CAV 1.0  Y.com XY 3.0  Y.com A 4.0  Y.com B   Thanks.
I have Splunk table output as below. for every different id 1st occurrence, I want to keep id value here, but for all following records, I want to change the value to null.   time id value ... See more...
I have Splunk table output as below. for every different id 1st occurrence, I want to keep id value here, but for all following records, I want to change the value to null.   time id value 40:56.1 00J7ER7SGO8PHCAU4O2CM2LAES0006CA eree334 40:56.2 00J7ER7SGO8PHCAU4O2CM2LAES0006CA face 41:27.6 00J7ER7SGO8PHCAU4O2CM2LAES0006CA face 41:27.7 00J7ER7SGO8PHCAU4O2CM2LAES0006CA dsafasdf 41:27.8 00J7ER7SGO8PHCAU4O2CM2LAES0006CA earweraw 49:02.1 00J7ER7SGO8PHCAU4O2CM2LAES0006CF eqtdzgta 49:02.2 00J7ER7SGO8PHCAU4O2CM2LAES0006CF 12341234 49:03.1 00J7ER7SGO8PHCAU4O2CM2LAES0006CF efgwerwe 49:03.2 00J7ER7SGO8PHCAU4O2CM2LAES0006CF dafdsaf 49:03.3 00J7ER7SGO8PHCAU4O2CM2LAES0006CF erwqerqw 50:08.0 00J7ER7SGO8PHCAU4O2CM2LAES0006CF daadsfad 50:08.7 00J7ER7SGO8PHCAU4O2CM2LAES0006CF qerqwer 50:08.7 00J7ER7SGO8PHCAU4O2CM2LAES0006CF ewrqwerqr 50:08.8 00J7ER7SGO8PHCAU4O2CM2LAES0006CF dfasdfsad 50:08.9 00J7ER7SGO8PHCAU4O2CM2LAES0006CF ewqrqewr   after change,  it should be like this,  anyone knows how to do this? thanks in advance. time id value 40:56.1 00J7ER7SGO8PHCAU4O2CM2LAES0006CA eree334 40:56.2   face 41:27.6   face 41:27.7   face 41:27.8   earweraw 49:02.1 00J7ER7SGO8PHCAU4O2CM2LAES0006CF eqtdzgta 49:02.2   12341234 49:03.1   face 49:03.2   face 49:03.3   face 50:08.0   face 50:08.7   face 50:08.7   face 50:08.8   face 50:08.9   face       Kevin
Hi, i have read the instruction that you cannot install the Splunk enterprises version 8.x to windows server 2012 R2. i need to know what is the correct way to install the Splunk enterprises version... See more...
Hi, i have read the instruction that you cannot install the Splunk enterprises version 8.x to windows server 2012 R2. i need to know what is the correct way to install the Splunk enterprises version 8.x . should I need to install new host 2016 or any other method.  As i have 1 deployment server, 2 indexers, search head, universal forwarder. please share your thoughts  Thanks
Hi,  I'm attempting to build a query to find destination IP addresses that became source IPs for traffic in a 5min window.  What is the best way to do this? Given that it's IDS data, I don't think... See more...
Hi,  I'm attempting to build a query to find destination IP addresses that became source IPs for traffic in a 5min window.  What is the best way to do this? Given that it's IDS data, I don't think a join with subsearch would be good because of the 10,000 record limitation and the map function takes forever just looking at 15mins worth of data.  Any ideas or help is greatly appreciated!
I have some records that show interface utilization across multiple devices.  I would like to add the utilization from two different devices so that two series are presented on my timechart, summary ... See more...
I have some records that show interface utilization across multiple devices.  I would like to add the utilization from two different devices so that two series are presented on my timechart, summary of inbound utilization for devices A + B, and summary of outbound utilization for devices A+B. index=nnmperf "Interface Name"="Te0/1/0" "Node Name"="A" OR "Node Name"="B" | rename "Utilization In" as In | rename "Utilization Out" as Out | eval In=In*100 | eval Out=Out*100 | timechart span=30m avg(In) avg(Out) by "Node Name" I've tried to pipe the chart to addTotals, but I can't figure out how to split the total into two series one for inbound and one for outbound.  Could someone help me out?  Thank you!    
After timechart can the columns be sorted either in Ascending/Descending order    
Hi Folks, Getting error while run the # ./hwf-Splunk-Connect-for-Syslog.sh       sc4s script  curl: (3) Bad URL, colon is first character SC4S_ENV_CHECK_HEC: Invalid Splunk HEC URL, invalid ... See more...
Hi Folks, Getting error while run the # ./hwf-Splunk-Connect-for-Syslog.sh       sc4s script  curl: (3) Bad URL, colon is first character SC4S_ENV_CHECK_HEC: Invalid Splunk HEC URL, invalid token, or other HEC connectivity issue index=main. sourcetype=sc4s:fallback Startup will continue to prevent data loss if this is a transient failure.
Hello all, I'm having a time parsing issue that I don't know how to fix and am looking for some help. My inputs on the syslog looks like this: [monitor] index = * no_appending_timestamp = true ... See more...
Hello all, I'm having a time parsing issue that I don't know how to fix and am looking for some help. My inputs on the syslog looks like this: [monitor] index = * no_appending_timestamp = true host_segment = 5 disabled = false My Props for this source type is configured by a TA.  But the problem I'm having in the logs were from changes in our syslog system. The new log looks like Dec 14 08:50:19 bxxm-itb.net.xxx.xxx 1,2021/12/14 08:50:18, How do I configure props to tell splunk to ignore the first timestamp, skip the host fqdn and then parse the second time?
Hi  Actually i made  lookup with the list of ip address in .csv file. I want to write a query if there is traffic from the ip address which i had given in the lookups. Please help me woth the query... See more...
Hi  Actually i made  lookup with the list of ip address in .csv file. I want to write a query if there is traffic from the ip address which i had given in the lookups. Please help me woth the query. i have the Web datamodel as well   Thanks & Regards, Umesh Chandra Reddy 
Hi Everyone, I am trying to figure out how can I do dual forwarder configuration for universal forwarders. Can someone please guide me in getting some idea for it or point out to splunk-docs/article... See more...
Hi Everyone, I am trying to figure out how can I do dual forwarder configuration for universal forwarders. Can someone please guide me in getting some idea for it or point out to splunk-docs/articles that can be helpful.
Hi all, I wanted to ask a question: "is it possible to execute code based on a condition"? example: if A = B then "rename C as D" else "add a column" My problem: the where returns columns usually... See more...
Hi all, I wanted to ask a question: "is it possible to execute code based on a condition"? example: if A = B then "rename C as D" else "add a column" My problem: the where returns columns usually 2, (DIRECT, INDIRECT) but there are some cases that returns 3 (DIRECT, INDIRECT, SPC) a case that returns only 1 (INDIRECT) another that returns 1 (DIRECT). When I do the chart, the third field is called "row 3" (I hope to solve with rename). When I have only one field (INDIRECT) it is called "row 1" but if I call it "DIRECT" it is not good as the values ​​are from the INDIRECT. Same thing for the field only (LIVE). The problem I would like is that the chart always has 2 bars for both DIRECT and INDIRECT, even when there is not one of the two. with this code I have: | stats sum (*) by OFFERTA | transpose | addtotals fieldname = "TOTAL" | rename "row 1" as "DIRECT" | rename "row 2" as "INDIRECT" | rename "row 3" as "SPC" Solar year                                            DIRECT     INDIRECT     TOTAL sum (00_PREVIOUS_MONTH)        8                    4                 12 sum (01_PREVIOUS_MONTH)      32                  16               48 sum (02_PREVIOUS_MONTH)      42                 10               52 sum (03_PREVIOUS_MONTH)      30                  8                38 but if I only have 1 field (INDIRECT) I have as a result: Solar Year                                                  DIRECT       TOTAL sum (00_PREVIOUS_MONTH)              0                   0 sum (01_PREVIOUS_MONTH)              3                  3 sum (02_PREVIOUS_MONTH)              1                  1 sum (03_PREVIOUS_MONTH)               3                 3 sum (04_PREVIOUS_MONTH)               2                  2   I would like the chart to have also in this case the two fields with DIRECT and INDIRECT with the DIRECT field all zero
We have just upgraded to v8.1 and because we have a small license, we are subject to the license enforcement. The document states that enforcement will occur if you receive 45 warnings over a rolling... See more...
We have just upgraded to v8.1 and because we have a small license, we are subject to the license enforcement. The document states that enforcement will occur if you receive 45 warnings over a rolling 60-day window. What is unclear is what counts as a "warning". For example I have 9 indexers all sharing a single license pool, and when we went over the daily limit, we appears to receive 9 warnings - one per indexers. Is this expected? - for example This pool has exceeded its configured poolsize=xxx bytes. A CLE warning has been recorded for all members So does the 45 warning limit apply to these pool warnings?, hard warnings or license master warnings? I.e. going over the daily limit = 1 warning?
Hello splunk community. I have a search query which i am using to report the daily api stats. I have a requirement where i want to send the result of below query (which is a chart table) into slack. ... See more...
Hello splunk community. I have a search query which i am using to report the daily api stats. I have a requirement where i want to send the result of below query (which is a chart table) into slack. Query:   index=api* metaData.pid="apiDdata" | chart count BY apiName status   And the result looks like What i learnt from the the splunk webhooks is that it can send only one row of data at a time. So if i have to send the whole data, i need to send it result by result. So my question is, is there any way to combine the table into a single value something like below so that i can send it to slack at one shot ? Something like below ============================= || ApiName    |      Success    |      NULL  || --------------------------------------------------- || Api 1            ||    123               ||       222     || || Api 1            ||    123               ||       222     || || Api 1            ||    123               ||       222     || || APi 2            ||       123            ||       222.    || ---------------------------------------------------- The above table is a single string value which i am expecting it to be sent to slack. Is it possible ? Please help
We have two sites with two indexers per site. A total of four indexers. I have to set up certificate-based encryption from all forwarders to Indexers. What is the easiest way to go about setting up... See more...
We have two sites with two indexers per site. A total of four indexers. I have to set up certificate-based encryption from all forwarders to Indexers. What is the easiest way to go about setting up certificates? Can I generate one certificate for ALL forwarders and another certificate for ALL indexers ?   Any assistance is appreciated!
Hello I am a Splunk user, not admin, and I seem to be able to do a search like: | rest splunk_server=local servicesNS/-/-/data/ui/views/ Does that mean I have API access and how can I access this ... See more...
Hello I am a Splunk user, not admin, and I seem to be able to do a search like: | rest splunk_server=local servicesNS/-/-/data/ui/views/ Does that mean I have API access and how can I access this via Excel, PowerBI etc? What would be the URI and do I need a separate key? Thanks!
Hi sorry if this has been asked before, spent lot of time researching but can't find quite the answer. I have this json logged below, I want to do analysis on the order lines, so need a search to re... See more...
Hi sorry if this has been asked before, spent lot of time researching but can't find quite the answer. I have this json logged below, I want to do analysis on the order lines, so need a search to return two lines from my json example. Order Reference Description Value XXX PAUL 35,700 XXX IS GREAT 42,000 I've tried a million things, can't get it to work Thanks in advance Paul (who isn't actually that great!) THE JSON {   "orderReference": "xxx",   "orderLine": [   {       "orderLineUserItemDescription": "PAUL",        "orderLineUnitPrice": "35700.0",    },     {       "orderLineUserItemDescription": "IS GREAT",      "orderLineUnitPrice": "42000.0",    } ] }
need help on using command strptime/strftime   EX: input: December 7, 2021 1:00:01 PM          output: 12/1/2021   13:00:01