All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

I have a small all-in-one testing instance of Splunk Enterprise 8.1.3 (noone bothered to update for now ;-)) I wanted to do some testing on the question I posted yesterday - about permissions for da... See more...
I have a small all-in-one testing instance of Splunk Enterprise 8.1.3 (noone bothered to update for now ;-)) I wanted to do some testing on the question I posted yesterday - about permissions for datamodels and so on. Anyway, I created two indexes - dm_test1 and dm_test2. I created two users - test1 and test2. Created a separate role for each user. Each role has only one capability - search. And only one allowed index - dm_test1 for test1 role and dm_test2 for test2 role. There are no inherited capabilities, because I don't inherit from any other roles and the test1 and test2 are the only roles assigned to test1 and test2 users. So in theory, user test1 should only be able to do searches against test1 index and test2 - against test2. But it doesn't work. Both users can do searches from any index I have. Even from _internal ones. How to debug it? Again - there is no inheritance (at least no explicit one as far as I know about) These are the roles: As you can see - native capabilities - 1 each, no inherited capabilities. The "view indexes" checker shows only one native index per role and no inherited indexes. The users have only one role each So what's going on???
I want to predict Stock price and use Date as Fields to use for predicting, I am getting bad model. Is it I need to change the date to numeric? If so, how do i do it?
I read How do I use a small font size in questions and answers? and Allow the <small> tag, but I don't want to write <sup> </sup> for each paragraph. For example, I want everything below the line to... See more...
I read How do I use a small font size in questions and answers? and Allow the <small> tag, but I don't want to write <sup> </sup> for each paragraph. For example, I want everything below the line to be in a small font, but it fails. First, A fails to be quoted in yellow. Second, neither A nor B are smaller. and also I see a lot of the designing font style on the Fonts Monster website Now I want to use this designing font style in this tag
How to split a text like ""Liam John" "Grayson Roy" "Olivia"" into names filed using eval and text. names: Liam John Grayson Roy Olivia
I have some data from logs in Splunk where I need to determine what other requests were running concurrently at the time of any single event. Using the following query, I was able to have it return ... See more...
I have some data from logs in Splunk where I need to determine what other requests were running concurrently at the time of any single event. Using the following query, I was able to have it return a column for the number of requests that ran at the same time within my start time and duration. index="sfdc" source="sfdc_event_log://EventLog_SFDC_Production_eventlog_hourly" EVENT_TYPE IN (API, RestAPI) RUN_TIME>20000 | eval endTime=_time | eval permitTimeInSecs=(RUN_TIME-20000)/1000 | eval permitAcquiredTime=endTime-permitTimeInSecs | eval dbTotalTime=DB_TOTAL_TIME/1000000 | concurrency start=permitAcquiredTime duration=permitTimeInSecs | table _time API_TYPE EVENT_TYPE ENTITY_NAME apimethod concurrency permitAcquiredTime permitTimeInSecs RUN_TIME CPU_TIME dbtotalTime REQUEST_ID USER_ID | fieldformat dbTotalTime=round(dbTotalTime,0) | rename permitAcquiredTime as "Start Time", permitTimeInSecs as "Concurrency Duration", concurrency as "Concurrent Running Events", API_TYPE as "API Type", EVENT_TYPE as "Event Type", ENTITY_NAME as "Entity Name", apimethod as "API Method", RUN_TIME as "Run Time", CPU_TIME as "CPU Time", dbtotalTime as "DB Total Time", REQUEST_ID as "Request ID", USER_ID as "User ID" | sort "Concurrent Running Events" desc     I am now trying to investigate a single event in these results. For example, the top event says that at the time it ran, there were 108 concurrent requests running in the 20 second window of time. How can I identify those 108 events using this data? I imagine it would be querying the events that had a specific time frame range, but I am not sure if I need to check something like _time + - 10 seconds to see what was running within the 20 second window? I just need to understand the data behind this 108 events a little more for this top example. My end goal here is to be able to add a drill-down to the dashboard so that when I click on the 108, I can see those events that were running concurrently.
Hi  Can any one help me finding out Iphone device information from user agent  Example - iphone 12 , SE , 6 etc  User agent - Mozilla/5.0%20(iPhone;%20CPU%20iPhone%20OS%2014_7%20like%20Mac%20OS%20... See more...
Hi  Can any one help me finding out Iphone device information from user agent  Example - iphone 12 , SE , 6 etc  User agent - Mozilla/5.0%20(iPhone;%20CPU%20iPhone%20OS%2014_7%20like%20Mac%20OS%20X)%20AppleWebKit/605.1.15%20(KHTML,%20like%20Gecko)%20GSA/179.0.398606875%20Mobile/15E148%20Safari/604.1
Hi Guys,      I have a splunk command which returns a filename as the output. But i found that there is an extra space before and after the filename. query i am running here is, filetest | rex "se... See more...
Hi Guys,      I have a splunk command which returns a filename as the output. But i found that there is an extra space before and after the filename. query i am running here is, filetest | rex "sent to:  https://someurl/(?<file>.*)" | table file   Output displayed as: ............................... .............................. ............................. .............................. file.txt ............................. ........................... ............................   how can i get rid of the extra space before and after the file name?   Thanks.  
Hi,    I have two different queries running on same dashboard but a different panel.  Below is the query one which results the "reqid" as the output (ex:123456) Query 1: sourcetype=test*-cloudwatch... See more...
Hi,    I have two different queries running on same dashboard but a different panel.  Below is the query one which results the "reqid" as the output (ex:123456) Query 1: sourcetype=test*-cloudwatch-logs file.txt | rex "RequestId: (?&lt;reqid&gt;[\S+]*)\s" | table reqid | dedup reqid Output return as ex : 123456   Then, i would like feed the output of query1 as input of query2.   Query 2:  $query1_output$ | rex "uploaded to: s3://sample-us-east-1-s3/transmit-os/(?&lt;filename&gt;.*)" | table filename     Can someone suggest me is this right way of passing? How can i update the source code (XML) for the changes?   Thanks.
Hi There,   Log event:   [ 2021-02-04 23:14:28.925 SingleApp log:158] 200 GET /apache/proxy/user/1123123/qsdddqwedqewdqwdqwd/api (@1.1.1.1.1) 0.98ms k8s_label = app=jupyterhub k8s_label = compon... See more...
Hi There,   Log event:   [ 2021-02-04 23:14:28.925 SingleApp log:158] 200 GET /apache/proxy/user/1123123/qsdddqwedqewdqwdqwd/api (@1.1.1.1.1) 0.98ms k8s_label = app=jupyterhub k8s_label = component=server k8s_label = entity_type=jupyter-lab k8s_label = heritage=jupyterhub k8s_label = identity_name=namespace k8s_label = notebook_id=1123324234 k8s_label = notebook_name=learningpython.iypnb k8s_label = project_id=123 k8s_label = sdr.appname=notebooks k8s_label = user=mattparker k8s_label = user_id=1123234 k8s_label = zone=us-east-2b   I am trying to achieve the k8s_labels in table format in splunk but however, when i us the below query i am getting an error.  any help would be appreciated   Query: index=<index_name> sourcetype=<sourcetype_Name> 1123123 | table k8s_label="user_id=1123234",k8s_label="mattparker"   Error: Error in 'table' command: Invalid argument: 'k8s_label=user_id=1123234'   Thank You  
Hello, I am trying to build a new app using the Add-On Builder and am having problems getting OpenSSL functioning with my input. Has anyone successfully accomplished this and has the commands they c... See more...
Hello, I am trying to build a new app using the Add-On Builder and am having problems getting OpenSSL functioning with my input. Has anyone successfully accomplished this and has the commands they can share? This is the command I am using to import the module to "myapp/bin/lib" /Applications/Splunk/bin/splunk cmd pip3 install pyopenssl --target /Applications/Splunk/etc/apps/myapp/bin/lib --trusted-host pypi.org --trusted-host files.pythonhosted.org  I then use this in myapp's code: from lib.OpenSSL import SSL  This is the error I get when testing: File "/Applications/Splunk/etc/apps/myapp/bin/lib/OpenSSL/__init__.py", line 8, in <module> from OpenSSL import crypto, SSL ModuleNotFoundError: No module named 'OpenSSL'
Hello, Is there a way to create a health rule and/or policy to alert when an Agent Diagnostics Event occurs on the database agent?  We've had a few occasions where a database being monitored ran in... See more...
Hello, Is there a way to create a health rule and/or policy to alert when an Agent Diagnostics Event occurs on the database agent?  We've had a few occasions where a database being monitored ran into issues, most recently the database ran out of space for writing an audit trail, resulting in the agent returning the following error under event type "Agent Diagnostic Event": ORA-02002: error while writing to audit trail ORA-09925: Unable to create audit trail file Linux-x86_64 Error: 28: No space left on device Additional information: 9925 We do not have the application itself being monitored due to it's java version not supporting tls 1.2, just the oracle database is monitored. But if we can alert on this error it still helps to see issues with the database. Image attached of the event we are seeing under the Events section of the Database tab. Appreciate any advice or guidance on this. Thanks, Chad
I updated to 8.2.2.1 and suddenly all of our unit test output is polluted with hundreds of Authorization Failed messages,  each coming from various calls to splunk.rest.simpleRequest. The Authorizat... See more...
I updated to 8.2.2.1 and suddenly all of our unit test output is polluted with hundreds of Authorization Failed messages,  each coming from various calls to splunk.rest.simpleRequest. The Authorization failures themselves are perfectly normal - many of our tests actually assert that ownership and permissions are set the right way, and testing that involves trying to do things with the wrong user and asserting that the thing fails.   What's problematic is how formerly nice clean unit test output to the console or to stdout is now polluted with all this stuff about these normal failures. for example,  picture dozens or hundreds of these: Authorization Failed: b'{"success":false,"messages":[{"text":"It looks like your Splunk Enterprise\\nuser account does not have the correct capabilities to be able to post licenses.\\nReach out to your local Splunk admin(s) for help, and/or contact Sideview support\\nfor more detail."}]} Curious if anyone has run into this or knows where the messages might be coming from.
Hi team,      I am new to the splunk. I am just running a splunk query with an ID name to get the file assocaited with it from the logs. Event logs are looks below from the splunk, Logs:   the log... See more...
Hi team,      I am new to the splunk. I am just running a splunk query with an ID name to get the file assocaited with it from the logs. Event logs are looks below from the splunk, Logs:   the log files are    RequestId: abcd File uploaded to: s3://test/sample/file.json   source: source name   host: host name   etc   how can i run a query to search splunk event logs and look for .JSON file and return the full JSON file name? Any help is appreciated.   Thanks.
Hi Team, If  I have to write CIM Data Model use cases for Malware / Authentication, etc., what are the Rules / Logic have to follow initially. If there is any documentation / source can you please ... See more...
Hi Team, If  I have to write CIM Data Model use cases for Malware / Authentication, etc., what are the Rules / Logic have to follow initially. If there is any documentation / source can you please provide me the link. Thank You.
Hi,     I am running a basic search query in splunk search directly with command such as query: sourcetype=aws*-cloudwatch-logs file.txt | rex "RequestId: (?<reqid>[\S+]*)\s" | table reqid | dedu... See more...
Hi,     I am running a basic search query in splunk search directly with command such as query: sourcetype=aws*-cloudwatch-logs file.txt | rex "RequestId: (?<reqid>[\S+]*)\s" | table reqid | dedup reqid   it return the output reqid as "72830b96-c6g3-21fg-0063-ae728c68c1fc"   But if i run the same command through the splunk dashboard splunk returing the complete raw data which i dont need. why splunk dashboard return a raw result rather than a single output?   Any help is appreciated.   Thanks.
Our scrum team used to have a single Splunk dashboard, and a link to it on our Jira board, so that the product manager could easily jump to it when he was checking on our progress.  Now I've added 6 ... See more...
Our scrum team used to have a single Splunk dashboard, and a link to it on our Jira board, so that the product manager could easily jump to it when he was checking on our progress.  Now I've added 6 more dashboards, but would rather not add 6 more links if I can help it.  Is there a way to link to all of them at once?  The dashboard names share a common prefix for easy filtering, but filtering doesn't affect the URL so it doesn't seem like that will help.  Can I create a dashboard that contains links to other dashboards?  Or some sort of home page that's specific to our team?
Hi Team, Could someone help me with the field extraction for the below complex data(1000 lines of data I concised to 10 lines of data ) : columns to be extracted are statement_text , cnt, total_rea... See more...
Hi Team, Could someone help me with the field extraction for the below complex data(1000 lines of data I concised to 10 lines of data ) : columns to be extracted are statement_text , cnt, total_reads, total_writes, db_name statement_text="insert into #pt_queryhistory_time ( [sample_time],command_id,cnt,total_time,[db_name],sqlhandle,hash_char) select top 500 [sample_time] = convert(smalldatetime,'2021-09-27 18:55:00'), total_time = qs.total_elapsed_time/1000, avg_cpu = case when qs.execution_count = 0 then 0 else qs.total_worker_time/qs.execution_count/1000 end, db_name = case convert(int, pa.value) when null then '--unknown--' when 0 then '--unknown--' when 32767 then 'Resource' else db_name(convert(int, pa.value)) end, [db_id] = coalesce(convert(int, pa.value),0), hash_char = '' from sys.db_stats (nolock) as qs cross apply sys.dm_exec_plan_attributes(qs.plan_handle)as pa where pa.attribute = N'dbid' and isnull(convert(int,pa.value),0) = 8 order by qs.total_elapsed_time desc", cnt="1", total_reads="1888", total_writes="29", avg_writes="29",db_name="db1"  I couldn't able to extract the statement_text column completely and the remaining columns are working fine index="index" source="source1"| rex field=_raw "statement_text\=\"(?<statement_text>[@ ( ) $ . , \"A-Z ! ^ | \" - _ : { } A-Z a-z _ 0-9]+]+)\""   | rex field=_raw "cnt\=\"(?<cnt>[0-9]+)\"" | rex field=_raw "diff_reads\=\"(?<diff_reads>[0-9]+)\""| rex field=_raw "total_writes\=\"(?<total_writes>[0-9]+)\"" | rex field=_raw "db_name\=\"(?<db_name>[A-Z a-z _ 0-9]+)\"" Please provide me rex for statement_text column where the data can be extracted till the 2nd column "cnt"
Hi Team, Could someone help me with the field extraction for the below complex data(1000 lines of data I concised to 10 lines of data ) : columns to be extracted are statement_text , cnt, total_rea... See more...
Hi Team, Could someone help me with the field extraction for the below complex data(1000 lines of data I concised to 10 lines of data ) : columns to be extracted are statement_text , cnt, total_reads, total_writes, db_name statement_text="SELECT ISNULL("Interface Entry Header"."timestamp",@3) AS "timestamp",ISNULL("Interface Entry Header"."ImageURL",@8) AS "ImageURL",ISNULL("Interface Entry Header"."Pick Date Time",@7) AS "Pick Date Time",ISNULL("Interface Entry Header"."Start Execution",@7) AS "Start Execution",ISNULL("Interface Entry Header"."End Execution",@7) AS "End Execution",ISNULL("Interface Entry Header"."Send Request",@7) AS "Send Request",ISNULL("Maximo Issue Type$Interface Entry Line"."Header Entry No_",@4) AS "Maximo Issue Type$Interface Entry Line$Header Entry No_",ISNULL("Maximo Issue Type$Interface Entry Line"."Entry No_",@4) AS "Maximo Issue Type$Interface Entry Line$Entry No_" FROM "Algeria".dbo."Tango$Interface Entry Line" AS "Maximo Issue Type$Interface Entry Line" WITH(READUNCOMMITTED) WHERE ("Maximo Issue Type$Interface Entry Line"."Header Entry No_"="Interface Entry Header"."Entry No_") ORDER BY "Maximo Issue Type$Interface Entry Line$Header Entry No_" ASC,"Maximo Issue Type$Interface Entry Line$Entry No_" ASC) AS "SUB$Maximo Issue Type" WHERE ("Interface Entry Header"."Interface Code"=@0 AND "Interface Entry Header"."Direction"=@1 AND "Interface Entry Header"."Status"=@2) ORDER BY "Source No_" ASC,"Entry No_" ASC OPTION(OPTIMIZE FOR UNKNOWN, FAST 50)",    cnt="12",    total_reads="31", total_writes="0",   db_name="test"  I couldn't able to extract the statement_text column completely and the remaining columns are working fine index="index" source="source1"| rex field=_raw "statement_text\=\"(?<statement_text>[@ ( ) $ . , \"A-Z ! ^ | \" - _ : { } A-Z a-z _ 0-9]+]+)\""   | rex field=_raw "cnt\=\"(?<cnt>[0-9]+)\"" | rex field=_raw "diff_reads\=\"(?<diff_reads>[0-9]+)\""| rex field=_raw "total_writes\=\"(?<total_writes>[0-9]+)\"" | rex field=_raw "db_name\=\"(?<db_name>[A-Z a-z _ 0-9]+)\"" Please provide me rex for statement_text column where the data can be extracted till the 2nd column "cnt"
Hi, I am trying to get OWA url into Splunk. I deployed the TA-Windows-Exchange-IIS changing the local input.conf according to our on-prem Exchange version, the stanza [monitor://C:\Program Files\Mic... See more...
Hi, I am trying to get OWA url into Splunk. I deployed the TA-Windows-Exchange-IIS changing the local input.conf according to our on-prem Exchange version, the stanza [monitor://C:\Program Files\Microsoft\Exchange Server\V15\Logging\Ews]  After the deployment of the app, I see events coming in with the right sourcetype      index=msexchange sourcetype="MSWindows:2013EWS:IIS"     but on those events I cannot see either the source IP or the URL. I am trying to detect GET actions to the autodiscovery folder and I dont see on the received events either actions or url. any suggestion? thanks!  
Hello All, I have an inputlookup csv file that contains a list of host and corresponding docker containers running on those hosts for my environment. I am trying to generate a report where I can rep... See more...
Hello All, I have an inputlookup csv file that contains a list of host and corresponding docker containers running on those hosts for my environment. I am trying to generate a report where I can report daily list of host+containers that have not sent any logs to splunk for that particular day. Stats count does not return 0 event count. I am trying to get something like below: Monday                                 Tuesday                           Wednesday                   Thursday                              Friday host1-containerx             host3-containerx         host4-containerx.       host5-containerx              --- host1-containery            host3-containery         host5-containerx host2-containerz          host3-containerz host1-containery host2-containerz     I would appreciate any help   Thank you !!