All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

How do I export of list of triggered alerts in a CSV for a certain period of time from Splunk Cloud? This should be something like the view on the Activity>Triggered Alerts screen? The important fiel... See more...
How do I export of list of triggered alerts in a CSV for a certain period of time from Splunk Cloud? This should be something like the view on the Activity>Triggered Alerts screen? The important fields are triggered time and title of alert. Thank you.
need help on removing only endpoint from the data set  input :                                                                              output:                Endpoint CD/DVD                 ... See more...
need help on removing only endpoint from the data set  input :                                                                              output:                Endpoint CD/DVD                                                  CD/DVD               Endpoint Cloud Storage                                       Cloud Storage
I searched the documentation and splunk docker related code, but did not find the relevant configuration. how to enable indexer acknowledgment via environment variables? many thx~
Hello, { [-] guessedService: ejj logGroup: /aws/ejj/cluster logStream: kube-apt-15444d2f8c4b216a9cb69ac message:{"kind":"Event","stage":"ResponseComplete","requestURI":"/api/v1/namespace... See more...
Hello, { [-] guessedService: ejj logGroup: /aws/ejj/cluster logStream: kube-apt-15444d2f8c4b216a9cb69ac message:{"kind":"Event","stage":"ResponseComplete","requestURI":"/api/v1/namespaces/jej/endpoints/eji.com-aws-eji","verb":"update","user":{"username":"system:serviceaccount:efs:efs-provisioner","uid":"ab5d27b4c-71a4f77323b0","groups":["system:serviceaccounts","system:serviceaccounts:eji","system:authenticated"]},"sourceIPs":["10.0.0.0"],"userAgent":"eji-provisioner/v0.0.0 (linux/amd64) kubernetes/$Format","objectRef":{"resource":"endpoints","namespace":"edd","name":"dds.com-aws-edds","uid":"44ad8-899f-fbc1f4befb2f","apiVersion":"v1","resourceVersion":"8852157"},"responseStatus":{"metadata":{},"code":200}}   i already a below props and transforms to extract all the fields from message.  Props.conf [json_no_new] REPORT-json = report-json,report-json-new KV_MODE = none INDEXED_EXTRACTIONS = json LINE_BREAKER = ^{ NO_BINARY_CHECK = true disabled = false pulldown_type = true Transforms.conf [report-json] SOURCE_KEY = message REGEX = (?P<json2>{.+) DEST_KEY = _raw [report-json-new] REGEX = \\*"([^"]+)\":[\s]*"*(\[.*?\]|\{.*?\}"*\}*|[^"]+|\d+),* FORMAT = $1::$2 SOURCE_KEY = json2 Now from the result i have below field with json value user = {"username":"system:serviceaccount:efs:efs-provisioner","uid":"ab5d27b4c-71a4f77323b0","groups":["system:serviceaccounts","system:serviceaccounts:eji","system:authenticated"]} again with props and transform i want to extract values from user field. Please some one let me know if thats possible  Thanks
Hi Team,   I am checking for the update that if the Splunk application is also exposed to threat due to Vulnerability -  Apache Log4j.  Please let us know the work around if there is any impact. ... See more...
Hi Team,   I am checking for the update that if the Splunk application is also exposed to threat due to Vulnerability -  Apache Log4j.  Please let us know the work around if there is any impact. Thanks User
Hello all, I need a hand with a basic Splunk search. I appreciate this is Splunk 101 basics, but with other commitments, I am struggling to remember all commands.  What I need is to edit the follow... See more...
Hello all, I need a hand with a basic Splunk search. I appreciate this is Splunk 101 basics, but with other commitments, I am struggling to remember all commands.  What I need is to edit the following search, (or someone kind enough to completely improve the search), that rather the showing the same day next to each URL in the field "day", it just shows all URLs next to one single entry of the day. hopefully, that makes sense? index=netproxy user=(user) (url=https://www* OR url=http://www.) | stats count by day, url day                                    url                                                                   count Mon, 13 Dec 2021    https://www.bizographics.com/         1 Mon, 13 Dec 2021 https://www.bleacherbreaker.com/     2788 Mon, 13 Dec 2021 https://www.google-analytics.com/     3 Mon, 13 Dec 2021 https://www.google.co.uk/                       5                     Mon, 13 Dec 2021 https://www.googletagmanager.com/ 10 Mon, 13 Dec 2021 https://www.googletagservices.com/  6 Sat, 11 Dec 2021 https://www.capitalfm.com/                     23 Sat, 11 Dec 2021 https://www.capitalxtra.com/                   26 Sat, 11 Dec 2021 https://www.globalplayer.com/                 8   Basically what I am after is a search that shows,  -    day                                             url                                            times visited(count) Mon, 13 Dec 2021    https://www.bizographics.com/            1                                           https://www.bleacherbreaker.com/      2788                                           https://www.google-analytics.com/      3                                           https://www.google.co.uk/                         5                                           https://www.googletagmanager.com/   10                                           https://www.googletagservices.com/   5 If anyone can improve on my basic search it would be greatly appreciated
Hello I have this below data, { [-] guessedService: ejj logGroup: /aws/ejj/cluster logStream: kube-apt-15444d2f8c4b216a9cb69ac message:{"kind":"Event","stage":"ResponseComplete","... See more...
Hello I have this below data, { [-] guessedService: ejj logGroup: /aws/ejj/cluster logStream: kube-apt-15444d2f8c4b216a9cb69ac message:{"kind":"Event","stage":"ResponseComplete","requestURI":"/api/v1/namespaces/jej/endpoints/eji.com-aws-eji","verb":"update","user":{"username":"system:serviceaccount:efs:efs-provisioner","uid":"ab5d27b4c-71a4f77323b0","groups":["system:serviceaccounts","system:serviceaccounts:eji","system:authenticated"]},"sourceIPs":["10.0.0.0"],"userAgent":"eji-provisioner/v0.0.0 (linux/amd64) kubernetes/$Format","objectRef":{"resource":"endpoints","namespace":"edd","name":"dds.com-aws-edds","uid":"44ad8-899f-fbc1f4befb2f","apiVersion":"v1","resourceVersion":"8852157"},"responseStatus":{"metadata":{},"code":200}}   Need to extract user:{username:.....} user part alone  need to write once regex to extarct all the values inside user object..like user.username, user.uid, user.groups    
I am attempting to upgrade the Database Agents because of the issue with Logs4J. In AppD I can see four servers that have the database agent installed and are listed as 'Active'. I've connected to t... See more...
I am attempting to upgrade the Database Agents because of the issue with Logs4J. In AppD I can see four servers that have the database agent installed and are listed as 'Active'. I've connected to the first Windows server to stop the process, allowing me to upgrade and I can't see 'db-agent' listed as a running process. How do I find the process id on Windows to shut it down?
Hi Folks, I have been trying to pull some data associated with latest Run ID (associated with execution), I am having hard time writing query for it. Any help would be appreciated. Base Data:   in... See more...
Hi Folks, I have been trying to pull some data associated with latest Run ID (associated with execution), I am having hard time writing query for it. Any help would be appreciated. Base Data:   index="unified-tests" dataType="TestRail"   To this I would need to apply a filter for runId = result of below query   index="unified-tests" dataType="TestRail" | stats last(runId) as latestRunID by brand, platform | stats last(latestRunID) by latestRunID | table latestRunID   These are some failed attempts:   index="unified-tests" dataType="TestRail" runId=*[search index="unified-tests" dataType="TestRail" | stats last(runId) as latestRunID by brand, platform | stats last(latestRunID) by latestRunID | table latestRunID] index="unified-tests" dataType="TestRail" | join left=L right=R where L.runID = R.latestRunID [search index="unified-tests" dataType="TestRail" | stats last(runId) as latestRunID by brand, platform | stats last(latestRunID) by latestRunID | table latestRunID]  
Hello every body I have been struggling with a serious problem recently  my splunk version is 7.2  when I use  span Command (with tstats or bin ) , it starts from half hour ! instead of hour for ... See more...
Hello every body I have been struggling with a serious problem recently  my splunk version is 7.2  when I use  span Command (with tstats or bin ) , it starts from half hour ! instead of hour for example : | tstats count as count from datamodel=Log where Log.FinalStatus!=61  by  _time span=1h I have picture below as result , while I want time sections like 10 , 11, 12 ...   what should I do ?? Thank you
Hi Splunkers ,   The vulnerability was disclosed by the Apache Log4j project on Thursday, December 9, 2021. If exploited, it could potentially allow a remote attacker to execute code on the serv... See more...
Hi Splunkers ,   The vulnerability was disclosed by the Apache Log4j project on Thursday, December 9, 2021. If exploited, it could potentially allow a remote attacker to execute code on the server if the system logs an attacker-controlled string value on an affected endpoint. Can you please help me to these below Addon's & Apps are impacted or Not -- Splunk Add-on for Microsoft SCOM Okta Identity Cloud Add-on for Splunk Lookup Editor Number Display Viz Splunk Dashboard Examples Tanium App Splunk Enterprise Dashboards Beta Python for Scientific Computing Solarwinds Add on for splunk Tanium Technology Add on 100_genpact_splunkcloud Splunk DB Connect Tanium App Microsoft windows DHCP Add on for splunk Website Monitoring rest_ta   These are not listed in below links :-  Splunk Security Advisory for Apache Log4j (CVE-2021-44228) | Splunk https://www.splunk.com/en_us/blog/security/log-jammin-log4j-2-rce.html
I try to use the query   eval ID = if(ORG="MC",ID=substr(ID,-6),0)   Basically, I want in my result, if ORG="MC", I want to extract the last 6 characters of the field ID that go with it, otherwis... See more...
I try to use the query   eval ID = if(ORG="MC",ID=substr(ID,-6),0)   Basically, I want in my result, if ORG="MC", I want to extract the last 6 characters of the field ID that go with it, otherwise stay the same. But the result table always show ID as False if ORG="MC" How do I fix my query or have to go the other way?
Hi, I have a field called "catgories" whose value is in the format of a JSON array. The array is a list of one or more category paths. The paths are in the form of a comma separated list of one or mo... See more...
Hi, I have a field called "catgories" whose value is in the format of a JSON array. The array is a list of one or more category paths. The paths are in the form of a comma separated list of one or more (category_name:category_id) pairs.   Three example events have the following category data:  "categories":"[{"categ_name_a":"categ_id_a","categ_name_b":"categ_id_b","categ_name_c":"categ_id_c"},{"categ_name_m":"categ_id_m","categ_name_n":"categ_id_n"},{"categ_name_z":"categ_id_z"}]"  "categories":"[{"categ_name_d":"categ_id_d","categ_name_e":"categ_id_e"}]"  "categories":"[{"categ_name_f":"categ_id_f"}]" For each event, I am trying to extract the list of " >> " separated category_ids in each path into a multivalued field. So using the examples above I want to get a list of category paths: event # category_paths 1 "categ_id_a >> categ_id_b >> categ_id_c" "categ_id_m >> categ_id_n" "categ_id_z" 2 "categ_id_d >> categ_id_e" 3 "categ_id_f"   I have no way of knowing what the category names or ids will be or how many (category_name:category_id) pairs there will be in each category path. I also won't know how many category paths are in the categories JSON array. I have tried a bunch of ways to get at the data (spath, json_extract, regex) but I am new to this type of nested extraction. | makeresults | eval categories="[{\"categ_name_a\":\"categ_id_a\",\"categ_name_b\":\"categ_id_b\",\"categ_name_c\":\"categ_id_c\"},{\"categ_name_m\":\"categ_id_m\",\"categ_name_n\":\"categ_id_n\"},{\"categ_name_z\":\"categ_id_z\"}]" | spath input=categories output=category_paths path={} Can anyone help me? Thanks!!!   
Hi Guys, I am quite new to splunk. I was looking around to see any splunk documents pertaining to Data Fabric Search (DFS) as there is an impact since it leverages Log4j. However, I can't seem to fi... See more...
Hi Guys, I am quite new to splunk. I was looking around to see any splunk documents pertaining to Data Fabric Search (DFS) as there is an impact since it leverages Log4j. However, I can't seem to find how to check if my Splunk Enterprise is using it. Is there a setting that I can check from SearchHead, Indexer, etc if DFS is enabled?  Also, does it mean if I did not install DFS Manager App, I am not using the DFS functionality? Thank you, Rafiuddin
Hi, We need to move certain indexes to a completely different deployment. I need to make an estimate on how many heavy forwarders are currently being used to process data to these indexes. Your adv... See more...
Hi, We need to move certain indexes to a completely different deployment. I need to make an estimate on how many heavy forwarders are currently being used to process data to these indexes. Your advice will be very helpfull   Thanks
Hello, I have the following query. <base query> | rex field=msg "HTTP/1.1\\\" (?<http_status>\d{3})" | where http_status=200 OR http_status=401 | eval event_date=strftime(_time, "%x") | chart cou... See more...
Hello, I have the following query. <base query> | rex field=msg "HTTP/1.1\\\" (?<http_status>\d{3})" | where http_status=200 OR http_status=401 | eval event_date=strftime(_time, "%x") | chart count over event_date by http_status | eval "401 percentage" = round('401'*100/('200'+'401'),2)."%"   that gives me the following table event_date 200 401 401 percentage ========== === === ============== 11/28/21 61 24 28.24% 11/29/21 295 96 24.55% However, when I go to Visualization, I don't see "401 percentage" on the line chart, but I see the "401 percentage" legend. Any idea why and how to get "401 percentage" to show up on the chart? Also, currently, the column header for http_status is the value 200 & 401. How do I change the column headers to "HTTP 200" & "HTTP 401"? Thank you. I'd greatly appreciate the help!
I set up an Intelligence Download for https://threatfox-api.abuse.ch/api/v1  to use with the POST argument. However I am constantly getting the error:  Caught HTTPError when querying https://threatf... See more...
I set up an Intelligence Download for https://threatfox-api.abuse.ch/api/v1  to use with the POST argument. However I am constantly getting the error:  Caught HTTPError when querying https://threatfox-api.abuse.ch/api/v1: code=405 exc=HTTP Error 405: Method Not Allowed I also see the log line: file=threatlist.py:download_csv:333 | status="CSV download starting" However this url does not return a csv. It will return a json and I am planning to use (?ms) in the extract regex to parse it. Is ES thinking that this is a csv and doing a GET instead of a POST? How do I control that? I have in the UI set the POST argument to be a json string required by the API. I am able to run curl and retrieve the output from this url.
I have a few error messages in my ES about searches being delayed. How do I find the root causes. If multiple delays are taking place at different stages. Possible to find the stops & why searches ar... See more...
I have a few error messages in my ES about searches being delayed. How do I find the root causes. If multiple delays are taking place at different stages. Possible to find the stops & why searches are being delayed? Thank you for your response.
This includes High priority mostly. How do I view a list & provide a solution please. The error indicating the delays shows up as error message on the Ent. & even the ES server we have. Thanks a mill... See more...
This includes High priority mostly. How do I view a list & provide a solution please. The error indicating the delays shows up as error message on the Ent. & even the ES server we have. Thanks a million.