All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hello, I am seeing the below warning on our SH after splunk cloud performed a restart at the backend when i uninstalled an app from our Splunk SH. Error: Root Cause(s): The percentage of non high... See more...
Hello, I am seeing the below warning on our SH after splunk cloud performed a restart at the backend when i uninstalled an app from our Splunk SH. Error: Root Cause(s): The percentage of non high priority searches skipped (100%) over the last 24 hours is very high and exceeded the red thresholds (20%) on this Splunk instance. Total Searches that were part of this percentage=12. Total skipped Searches=12   I identified the searches that were skipped using the cloud monitoring console, Is there any troubleshooting steps  to fix this message since we are still seeing the SH health condition as RED.   Thanks
How to extract values from below log file using rex? Log: {Attribute(name=xyz, values={'1'}), Attribute(name=attempts, values={'2'}), Attribute(name=Count, values={'0'}), Attribute(name=MemberNumbe... See more...
How to extract values from below log file using rex? Log: {Attribute(name=xyz, values={'1'}), Attribute(name=attempts, values={'2'}), Attribute(name=Count, values={'0'}), Attribute(name=MemberNumber, values={'31234'})}   Result in table: 1 2 0 31234
Hello Team ,   We have a Splunk ITSI version running on 4.7.1 in Splunk Production and the plan is to upgrade to Splunk 4.9.1 in QA and DEV first followed by Splunk Production and I have upgraded t... See more...
Hello Team ,   We have a Splunk ITSI version running on 4.7.1 in Splunk Production and the plan is to upgrade to Splunk 4.9.1 in QA and DEV first followed by Splunk Production and I have upgraded to new version 4.9.1 in DEV ,when i am trying to restore the prod and setup in QA restore job is failing so that I can perform the complete Upgrade with KPI and Entity.   I even tried reverting the older version(4.7.1) and tried to restore the configurations in QA but still job is failing where as the backup was working fine so need your suggestions.              
We need to get Windows Print Spooler logs into splunk but not sure where to start. The specific event codes are generated and viewable from Windows Event Viewer (Applications and Services\Microsoft\W... See more...
We need to get Windows Print Spooler logs into splunk but not sure where to start. The specific event codes are generated and viewable from Windows Event Viewer (Applications and Services\Microsoft\Windows\PrintService\Operational) codes 307 and 800. If anyone can point me in the right direction that would be great. Thanks! 
I am trying to look for accounts which are not active anywhere in network. (index=network user=*) OR (index=okta SamAccountName=*) | eval InActive_Accounts=if(user==SamAccountName, "Active" , "NotAc... See more...
I am trying to look for accounts which are not active anywhere in network. (index=network user=*) OR (index=okta SamAccountName=*) | eval InActive_Accounts=if(user==SamAccountName, "Active" , "NotActive") | table user, SamAccountName, InActive_Accounts I tried it with coalesce as well but not getting any result.
I have a request that the version of Java on the HFs need to be updated, or have Java removed. Is Java needed to the functional operation of the Heavy Forwarders?   [xxxxxxxxxxxx ~]$ java -version... See more...
I have a request that the version of Java on the HFs need to be updated, or have Java removed. Is Java needed to the functional operation of the Heavy Forwarders?   [xxxxxxxxxxxx ~]$ java -version openjdk version "1.8.0_302" OpenJDK Runtime Environment (build 1.8.0_302-b08) OpenJDK 64-Bit Server VM (build 25.302-b08, mixed mode)   [xxxxxxxxxx ~]$ which java /usr/bin/java    
Splunk Searches Skipped on the Cluster master console error messages   The percentage of non high priority searches skipped (44%) over the last 24 hours is very high and exceeded the red threshold... See more...
Splunk Searches Skipped on the Cluster master console error messages   The percentage of non high priority searches skipped (44%) over the last 24 hours is very high and exceeded the red thresholds (20%) on this Splunk instance. Total Searches that were part of this percentage=1608..... Total skipped Searches=720...
These are dashboards which are scheduled to be emailed out at 8am every morning. The dashboard widgets contain data from the previous 24 hours. Occasionally, certain panels in the emailed report will... See more...
These are dashboards which are scheduled to be emailed out at 8am every morning. The dashboard widgets contain data from the previous 24 hours. Occasionally, certain panels in the emailed report will show "No results found.". If I go to the dashboard immediately after it is emailed out and this message is displayed, the results are populated within seconds, no problem. It seems for some reason the results are not making it to the report. Again: within seconds of the emailed report being sent out with the "No results found", the dashboard can be run manually and the results will populate quickly. So it appears the results are available at the time of report generation. It is not always the same panel that displays "No results found".   
I'm configuring the SOAR/Phantom app - Splunk HTTP. I've set it up to use OAuth, provided the authentication URL and the clientID & secret. When I test connectivity it says the action failed with: "1... See more...
I'm configuring the SOAR/Phantom app - Splunk HTTP. I've set it up to use OAuth, provided the authentication URL and the clientID & secret. When I test connectivity it says the action failed with: "1 action failed Error fetching token from https://api.domain/oauth2/token. Server returned 201". The thing is the API is supposed to return a 201 when the authentication succeeds.  Is there a place to edit the app to allow a 201 response as a successful request? 
More for anyone else who runs into this issue than myself. I experienced an issue where my custom NAV menu on my app was not displaying on my dashboards. (The entire app menu bar was gone actually... See more...
More for anyone else who runs into this issue than myself. I experienced an issue where my custom NAV menu on my app was not displaying on my dashboards. (The entire app menu bar was gone actually so it didn't even show the App logo/name). For reference the screen shot below is the portion I am referring to.   I had a nav/default.xml like the following below: <nav> <view name="your_app_3.0_here_dashboard1" default='true' /> <view name="your_app_3.0_here_dashboard2" /> </nav>   I combed through the entire app, permissions, local/default precedence, etc. After hours, I just ended up creating a new app and cloning the dashboard with a random name and the nav menu worked as expected. I did it again but with the original view name and it stopped working again - that's how I came to the solution. The issue was having a . in the view name. I didn't go as far as to identify if it was the view name itself having an issue or the nav xml not recognizing it for whatever reason. Renaming to "your_app_3_here_dashboard1" resolved the issue. TLDR: if your dashboard isn't displaying your nav menu, try getting rid of special characters in your view name.
Hi. I've been trying to figure this out for a while now but no luck.  Maybe someone has done and/or seen something similar?   datetime cust  prod 1:00 PM A 100 1:00 PM A 200 1:00... See more...
Hi. I've been trying to figure this out for a while now but no luck.  Maybe someone has done and/or seen something similar?   datetime cust  prod 1:00 PM A 100 1:00 PM A 200 1:00 PM A 300 1:00 PM B 100 1:00 PM C 100 2:00 PM A 100 2:00 PM A 200 2:00 PM A 300 3:00 PM D 200   The above is an example of my splunk data source.    First item i had to count where the distinct users.   I did that.   But I also have to create single value charts for the following combination counts: Distinct Count of CUST where PROD = 100 Distinct Count of CUST where PROD = 200 Distinct Count of CUST where PROD = 300 Again, these wasn't hard.  I just added a where statement at the top of the Splunk query: But here's where I'm stuck. I also need to create some dashboard single count charts that would have this type of combinations of the PROD categories: Distinct Count of CUST where PROD = 100 & PROD = 200 Distinct Count of CUST where PROD = 100 & PROD = 300 Distinct Count of CUST where PROD = 200 & PROD = 300 I've tried using mvcombine then trying to create a filter to find the above combinations, but after several hours & googling, no luck. Thanks in advance!!  
Hi All, We have configures below stanza on SMB server(UF) and splunk forwarder to collect SMB logs, [WinEventLog://Microsoft-Windows-SMBServer/Audit] disabled = 0 start_from = oldest current_onl... See more...
Hi All, We have configures below stanza on SMB server(UF) and splunk forwarder to collect SMB logs, [WinEventLog://Microsoft-Windows-SMBServer/Audit] disabled = 0 start_from = oldest current_only = 0 index = wineventlog Can you please let us know if the above stanza worked for anyone to collect the logs or  share any working stanza is appreciated. TIA Sharada
Hello, I would like to ask about problem with parsing log using regex with lookahead. I have this log:   Oct 10 04:18:31 ATLAS Threat Categories|Blocked Host|7|rt=1633832250000 src=122.226.102.59... See more...
Hello, I would like to ask about problem with parsing log using regex with lookahead. I have this log:   Oct 10 04:18:31 ATLAS Threat Categories|Blocked Host|7|rt=1633832250000 src=122.226.102.59 cs3Label=Match Type dpt=23 cn2=13 proto=TCP dst=193.85.146.63 cn1=21129644 spt=39528 cs2Label=Protection Group Name cs1Label=IOC Pattern cn1Label=Element Id cn2Label=Protection Group ID cs7Label=Threat Category cs7=Malware cs6=Telnet Bruteforce cs1=122.226.102.59 cs6Label=Threat Name cs3=ip cs2=Default Protection Group   As you can see, there are a number of parameters for which two fields are always used, eg "cs1Label" (parameter name) and "cs1" (parameter value). My goal is to create a new field in search time parsing phase, which will be the value of the field "cs1Label" and the value will be the value of the field "cs1". For example: IOC Pattern = 122.226.102.59 The problem is that the log does not have a fixed structure, the order of the individual fields changes. Therefore, "normal" regex cannot be used. So I created the following regex using a lookahead that parses the appropriate values ​​(I tested it in a regex101.com tester and it works):   ^(?=.*\bcs1Label=\b((.*?)((\s\w+\=)|($))))(?=.*\bcs1=\b((.*?)((\s\w+\=)|($))))   Unfortunately, when I use it in Splunk, in transforms.conf, it doesn't work. My transforms.conf looks like this:   [combined_field_cs1] SOURCE_KEY = _raw REGEX = ^(?=.\bcs1Label=\b((.?)((\s\w+=)|($))))(?=.\bcs1=\b((.?)((\s\w+=)|($)))) FORMAT = $2::$7   props.conf   REPORT-combined_field_cs1 = combined_field_cs1   Strictly speaking, when I simply want to look at the messages in a given index, the search freezes, it does not display any messages and I have to close it manually. I made some testing and it obvious that REGEX is the problem. It is not clear to me why the regex in Splunk does not work. Or did I choose the completely wrong path and need to use a completely different way to achieve my goal? Could yomeone more experinced help? Any help will be highly appreciated. Best regards Lukas Mecir
I have an event that comes to the index.  | search index = indexname  filed1  field2 field3    I need to write an exception that will discard the field before getting into the index output: ... See more...
I have an event that comes to the index.  | search index = indexname  filed1  field2 field3    I need to write an exception that will discard the field before getting into the index output: | search index = indexname  filed1  field3 
how to include specific rows from a table in a panel into another panel in the same dashboard?
Hello,   Is it possible to show more than one value in Radial Gauge? thanks
Hi - Unable to login to Search Head Web UI using the password set for admin user during the installation.   Could you please let me know how to reset the password for "Admin" user?   Thank You
This is the inputs from the app I created for the windows logs: [WinEventLog://Application] index = replicate3 disabled = 0 start_from = oldest current_only = 0 checkpointInterval = 5 renderXm... See more...
This is the inputs from the app I created for the windows logs: [WinEventLog://Application] index = replicate3 disabled = 0 start_from = oldest current_only = 0 checkpointInterval = 5 renderXml=0 [WinEventLog://Security] index = replicate3 disabled = 0 start_from = oldest current_only = 0 evt_resolve_ad_obj = 1 checkpointInterval = 5 blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)" blacklist2 = EventCode="566" Message="Object Type:(?!\s*groupPolicyContainer)" renderXml=0 [WinEventLog://System] index = replicate3 disabled = 0 start_from = oldest current_only = 0 checkpointInterval = 5 renderXml=0   I created a special index for it, but it is not getting any results.  I also have sent over the splunk TA for windows logs, but still nothing is coming in.  The index was created successfully and the apps show on the client.  What else am I missing.
Does the Lookup cmd allow for Where clause to filter the output of Lookup? Or do I need to have an extra sub search with | inputlookup  with the Where clause I need: Ex of what I'd like to do: | ma... See more...
Does the Lookup cmd allow for Where clause to filter the output of Lookup? Or do I need to have an extra sub search with | inputlookup  with the Where clause I need: Ex of what I'd like to do: | makeresults | eval FullName = split("First1 Last1, First2 Last2, First3 Last3",",") |mvexpand FullName | lookup MyNamesFile.csv "emp_full_name" as FullName  OUTPUTNEW Phone as phone ``` HERE I WANT TO FILTER ON SPECIFIC criteria form the lookup file``` | where state="New York" and city="New York" | mvexpand phone   In concept this is the type of filter I need. Obviously the above code doesn't work and I'd like to know what is the best way to achieve filtering out lookup output.
Hello Splunksters, I'm new to Splunk and am constructing my first subsearch.  I've read the documentation on subsearches, but am apparently missing something fundamental.  I have a log file that cap... See more...
Hello Splunksters, I'm new to Splunk and am constructing my first subsearch.  I've read the documentation on subsearches, but am apparently missing something fundamental.  I have a log file that captures and records events based on a GUID.  Obviously GUIDs aren't something one goes searching for directly.  The primary search is by phone number.  So, I need to accept a phone number, retrieve the associated GUID and then return all the results tied to that GUID.  I have the search retrieving the GUID working, and want to use that as the subsearch. Ultimate search I wish to run: index="myIndex" sourcetype="mySourceType" 7c10cfbc-6892-4590-a05c-c12acf16932b   Search retrieving GUID (this works): index="myIndex" host="myHost" sourcetype="mySourceType" <phoneNumber> | rex field=_raw "(?<GUID>\].*$$)" | rex field=GUID "(?<GUID>[^NAME]+)" | eval GUID=replace(GUID, "]", "") | rex field=GUID mode=sed "s/(^\s+)|(\s+$)//g" | dedup GUID | table GUID   What I thought the subsearch should look like: index="myIndex" sourcetype="mySourceType" [search index="myIndex" host="myHost" sourcetype="mySourceType" <phoneNumber> | rex field=_raw "(?<GUID>\].*$$)" | rex field=GUID "(?<GUID>[^NAME]+)" | eval GUID=replace(GUID, "]", "") | rex field=GUID mode=sed "s/(^\s+)|(\s+$)//g" | dedup GUID | table GUID] Everything in the [] returns the GUID, as I understand the doc, that should be what is searched for in the main search.  What am I missing? Thank you! Brian