All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hello 10-09-2021 00:30:50.477 +0000 ERROR PersistentScript - From {/opt/splunk/bin/python /opt/splunk/lib/python2.7/site-packages/splunk/persistconn/appserver.py}: /opt/splunk/etc/apps/splunk_ta_o36... See more...
Hello 10-09-2021 00:30:50.477 +0000 ERROR PersistentScript - From {/opt/splunk/bin/python /opt/splunk/lib/python2.7/site-packages/splunk/persistconn/appserver.py}: /opt/splunk/etc/apps/splunk_ta_o365/bin/3rdparty/urllib3/connectionpool.py:846: InsecureRequestWarning: Unverified HTTPS request is being made. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings  10-09-2021 00:30:50.477 +0000 ERROR PersistentScript - From {/opt/splunk/bin/python /opt/splunk/lib/python2.7/site-packages/splunk/persistconn/appserver.py}: InsecureRequestWarning)
Hallo, can you specify what is the difference between a Qualified partner and Associated partner? We are running splunk since 2015 and we have to renew our support. Best regards
Hello all,   Have been trying to extract the values through an inconsistent data as below. Highlighted values needs to be extracted, however the default extrcation through the tool is not working a... See more...
Hello all,   Have been trying to extract the values through an inconsistent data as below. Highlighted values needs to be extracted, however the default extrcation through the tool is not working as expected. Could you please help in this. 50271234,00004105,00000000,1600,"20210901225500","20210901225500",4,-1,-1,"SYSTEM","","psd217",46769359,"MS932","KAVS0263-I \x83W\x83\x87\x83u(AJSROOT1:/\x90V\x8A_\x96{\x94ԏ\x88\x97\x9D/\x92l\x8ED\x94\xAD\x8Ds/04_\x92l\x8ED\x8Ew\x8E\xA6\x83f\x81[\x83^\x98A\x8Cg_\x8CߑO1TAX/V9B01_B:@5V689)\x82\xF0\x8AJ\x8En\x82\xB5\x82܂\xB7(host: UXC510, JOBID: 56620)","Information","jp1admin","/Example/JP1/AJS2","JOB","AJSROOT1:/\x90V\x8A_\x96{\x94ԏ\x88\x97\x9D/\x92l\x8ED\x94\xAD\x8Ds/04_\x92l\x8ED\x8Ew\x8E\xA6\x83f\x81[\x83^\x98A\x8Cg_\x8CߑO1TAX/V9B01_B","JOBNET","AJSROOT1:/\x90V\x8A_\x96{\x94ԏ\x88\x97\x9D/\x92l\x8ED\x94\xAD\x8Ds/04_\x92l\x8ED\x8Ew\x8E\xA6\x83f\x81[\x83^\x98A\x8Cg_\x8CߑO1TAX","AJSROOT1:/\x90V\x8A_\x96{\x94ԏ\x88\x97\x9D/\x92l\x8ED\x94\xAD\x8Ds/04_\x92l\x8ED\x8Ew\x8E\xA6\x83f\x81[\x83^\x98A\x8Cg_\x8CߑO1TAX/V9B01_B","START","20210901225500","","",16,"A0","AJSROOT1:/\x90V\x8A_\x96{\x94ԏ\x88\x97\x9D/\x92l\x8ED\x94\xAD\x8Ds","A1","04_\x92l\x8ED\x8Ew\x8E\xA6\x83f\x81[\x83^\x98A\x8Cg_\x8CߑO1TAX","A2","V9B01_B","A3","@5V0689","ACTION_VERSION","0600","B0","n","B1","1","B2","jp1admin","B3","psd217","C0","UXC510","C1","","C6","r","H2","677758","H3","j","H4","q","PLATFORM","NT",     50270531,00003A71,00000000,3588,"20210901224800","20210901224800",4,-1,-1,"SYSTEM","","PSC611",565029,"MS932","""SE_LOG: User - GetStringS: Failed to LookupAccountName. Domain (\\SERVER-retailing.group), Name (SERVER\QVADMIN). System Error""","Error","","/Example/JP1/NTEVENT_LOGTRAP/QlikViewServer","LOGFILE","NTEVENTLOG","LOGFILE","NTEVENTLOG","","","","","",9,"A0","1630504080","A1","PSC611.H2O-retailing.group","A2","Application","A3","Error","A4","None","A5","300","A6","N/A","PLATFORM","NT","PPNAME","/HITACHI/JP1/NTEVENT_LOGTRAP",   Highlighted fields are the ones I am trying to extract here.   Thank you
Hello Splunkers, Is it possible to hide Splunk Icon and also the App dropdown, from top left for a particular user role?     TIA,  
My requirement is something like this: Lookup 1 looks like this Name | Avg_Count A          | 3 B          |  7 D          | 8 F           | 5 Lookup 2 looks like this: Name | Current_Count ... See more...
My requirement is something like this: Lookup 1 looks like this Name | Avg_Count A          | 3 B          |  7 D          | 8 F           | 5 Lookup 2 looks like this: Name | Current_Count A          | 2 C          | 4 D          | 6 In the search, I input both these lookups and want results like this: Name | Avg_Count | Current_count A          | 3                     | 2 B          | 7                     | 0/null (0 preferred) D          | 8                     | 6 F          | 5                      | 0 C         | 0                      | 4 I have tried join/append/appendcols but all these have their limitations and won't give the intended results. Also looked at many solutions from community but couldn't find one. Thanks in advance! Shaquib
please someone guide me.
I have a timechart from the command timechart span=1d count by skill1 which looks like this: _time VALUE1 VALUE2 VALUE3 VALUE4 2021-09-15 77 243 17 28 2021-09-16 80 104 65 22 ... See more...
I have a timechart from the command timechart span=1d count by skill1 which looks like this: _time VALUE1 VALUE2 VALUE3 VALUE4 2021-09-15 77 243 17 28 2021-09-16 80 104 65 22   And another timechart from the command timechart span=1d count by skill2 which looks like this: _time VALUE1 VALUE2 VALUE3 VALUE4 2021-09-15 70 200 10 12 2021-09-16 56 87 54 11   I want to create a new timechart which should have skill1's values - skill2's values. As follows: _time VALUE1 VALUE2 VALUE3 VALUE4 2021-09-15 7 43 7 16 2021-09-16 14 17 11 11   I tried using the command:   timechart span=1d count by skill1-skill2   But it won't work.   Any suggestions on how to create the new timechart?
Hello  "Good Day"   How to add the progress bar inside the cell in dashoard.i need the dashboard panel format in the below way I want to show the progress bar inside the table format panel.... See more...
Hello  "Good Day"   How to add the progress bar inside the cell in dashoard.i need the dashboard panel format in the below way I want to show the progress bar inside the table format panel.Could please help me out with this?
Hi to whomever find this The incident management review settings has repeated events What I did? I purpose logged in with the wrong information to some device, but I only did it once. Howver, the ... See more...
Hi to whomever find this The incident management review settings has repeated events What I did? I purpose logged in with the wrong information to some device, but I only did it once. Howver, the result shown below is generated twice in the Incident Management Review My settings for this correlation search Also, the things I have specified, such as: Severity Default Status Recommended Actions were not shown whenever the event is generated Result   Settings      
Hi. I know a lookup file can contain wildcards and use them with the WILDCARD(<field>) setting, but is it possible to do the opposite, where the wildcard is in the dataset, rather then the lookup? F... See more...
Hi. I know a lookup file can contain wildcards and use them with the WILDCARD(<field>) setting, but is it possible to do the opposite, where the wildcard is in the dataset, rather then the lookup? For more detail: I have a lookup file that contains names and some location information, formatted like this: lastname, firstname, m [us-us]   I have some source data that contains names, without the middle initial or the location data. I can manipulate it to get it into lastname, firstname format.  Is it possible to do wildcard matching to a lookup when the wildcard is in the data set, as opposed to the lookup file?  So, if my data has a field called name as Doe, John* and the lookup file has fullname: Doe, John M [us-us], it would be a match? | lookup myfile fullname as name  I appreciate any help. I tried looking around for this, but only found references to the wildcard in the lookup, not in the dataset.
Hi  I have got this log where it shows how much time it takes to load investor page in millisecond(ms) 2021-09-15 13:40:12,005 {c0cf807e-ee8b-4bd7-bf10-b586302ce001} XYZ/Online/0659251190 END [/inv... See more...
Hi  I have got this log where it shows how much time it takes to load investor page in millisecond(ms) 2021-09-15 13:40:12,005 {c0cf807e-ee8b-4bd7-bf10-b586302ce001} XYZ/Online/0659251190 END [/investor/load.htm] (5498) - 3312ms   I want to create a timeline chart to show how string "END [/investor/load.htm]" takes time to load at different period. I have got timepicker so I can get but how to show timeline for this string. SPL like index=prd_applog OR index=prd_middleware) appid::a0061f sourcetype="btsfl:bti:audit"| search "END [/investor/load.htm]" | timechart span=1m  <then something to be added here like regex to give that timeline>   Thanks  
Hello I have 3 sets of data and I want to join them all but they don't have the same common field, the trouble I'm having is linking table 2 to table 3. Table 1 host, ip Table 2 host, ip, use... See more...
Hello I have 3 sets of data and I want to join them all but they don't have the same common field, the trouble I'm having is linking table 2 to table 3. Table 1 host, ip Table 2 host, ip, user Table 3  user, location
Before creating my own set of knowledge objects to get information on user activity, especially around searches, I decided to see what else was out there.  I stumbled across the Search Activity app w... See more...
Before creating my own set of knowledge objects to get information on user activity, especially around searches, I decided to see what else was out there.  I stumbled across the Search Activity app which seemingly has pretty much everything I am looking for.  However, it isn't working in my Splunk Enterprise 8.2 environment.  Most dashboards don't populate data and it will not use the SA-ldapsearch add-on that is installed, configured, and working properly.  My guess is that the app is no longer supported (no updates since 2019).  Is anyone successfully using the app in Splunk 8.x? Any other recommendations for a similar app that may exist?  The only other thing I found was the User Monitoring for Splunk app, which  has some of the things I am looking for.  The data reported doesn't seem to be complete, which may just require some tweaking.  Curious what others may be using, if anything, to gain insight into Splunk user activity, especially as it pertains to user search behavior.
Hello All Just got a job with Splunk inheritance, no knowledge about Splunk I could say I'm in the category Splunk for Dummy. what I know is we have Splunk Enterprise Universal forward install on... See more...
Hello All Just got a job with Splunk inheritance, no knowledge about Splunk I could say I'm in the category Splunk for Dummy. what I know is we have Splunk Enterprise Universal forward install on domain controller and other important servers as well.  Could someone assistance me creating alerts for the following Excessive Login Failures Account Added to Security Enabled Group Event Logs Cleared Detect Excessive Account Lockouts from Endpoint  Short Lived Windows Accounts Windows User Account Created/Deleted Unclean Malware Detected Disk Utilization Over 95% thank you very much in advance.
I am trying to get our Add-on that was developed for standalone Splunk to work in a SHC environment. The Add-on takes input from the user in a setup view and saves the configuration values via custo... See more...
I am trying to get our Add-on that was developed for standalone Splunk to work in a SHC environment. The Add-on takes input from the user in a setup view and saves the configuration values via custom endpoint using the Splunk JS SDK. When Set up is run on a standalone instance we get custom fields from the system we are connecting to and create the modular alert html using the custom REST endpoint (also stored in /data/ui/alert/sa_myapp.html). Is there a way to replicate the modular alert html across the search had cluster members if running Setup from the Deployer? As far as I can tell the Setup needs to be run on each search head member to generate the html for that node and this conflicts with SHC best practices with Setup run only on the deployer and pushing the conf files to the SHC members. Setup may need to be rerun for the Add-on if custom fields are added or deleted in the system we are connecting to, to change the html used for mapping the fields between Splunk and our system. Is there a solution so that Setup can only be run on the deployer? How can I replicate the html across the cluster members? In my investigation the file /data/ui/alert/sa_myapp.html is not replicated across the search heads. If Setup is run on each search head cluster member the html is generated. It is my understanding that Setup should not be run on the SHC members but only on the deployer.  Can Setup run on the deployer post to the custom endpoint on each SHC member?
Please share the process of adding an .xlsx file to a Lookup list in Splunk Enterprise. Thank you a bunch.
I have set up new data sources already in Splunk that bring in CIM compliant data (from sophos and cisco meraki). Is there a way that I can link them to the InfoSec App? I didn't originally set up th... See more...
I have set up new data sources already in Splunk that bring in CIM compliant data (from sophos and cisco meraki). Is there a way that I can link them to the InfoSec App? I didn't originally set up the InfoSec app so I am unsure how data gets tied to it. Most documentation online is unhelpful for adding new data sources to the InfoSec App unless its one of the very few listed in the data onboarding guides in the Splunk Security Essentials app. Any help or references to actually helpful documentation on adding a new data source would be greatly appreciated. 
When mean & avg are both present on a "stats" search, the first one in order will be missing so: | makeresults count=100 | eval Value=random() % 100 | Stats count(Value) AS Count avg(Value) AS Avg ... See more...
When mean & avg are both present on a "stats" search, the first one in order will be missing so: | makeresults count=100 | eval Value=random() % 100 | Stats count(Value) AS Count avg(Value) AS Avg mean(Value) AS Mean results in: Count Avg Mean 100   49.49   While | makeresults count=100 | eval Value=random() % 100 | Stats count(Value) AS Count mean(Value) AS Mean avg(Value) AS Avg results in: Count Mean Avg 100   43.78   So why is one of the values missing?   John W.
I'm configuring our Jira add-on to connect with our Jira Software in the Cloud connect with he add on. I'm using API Token instead of Personal Access Token. Yet it still not communicating with our Ji... See more...
I'm configuring our Jira add-on to connect with our Jira Software in the Cloud connect with he add on. I'm using API Token instead of Personal Access Token. Yet it still not communicating with our Jira Cloud. Would the configured OURin the addon be the same URL we access our Jira Cloud.
| makeresults | eval _raw="!!! --- HUB ctxsdc1cvdi013.za.sbicdirectory.com:443 is unavailable --- !!! user='molefe_user' password='molefe' quota='user' host='002329bvpc123cw.branches.sbicdirectory... See more...
| makeresults | eval _raw="!!! --- HUB ctxsdc1cvdi013.za.sbicdirectory.com:443 is unavailable --- !!! user='molefe_user' password='molefe' quota='user' host='002329bvpc123cw.branches.sbicdirectory.com' port='443' count='1' !!! --- HUB 002329bvpc123cw.branches.sbicdirectory.com:443 is unavailable --- !!! host='005558bvpc5ce4w.za.sbicdirectory.com' port='443' count='1' !!! --- HUB 005558bvpc5ce4w.za.sbicdirectory.com:443 is unavailable --- !!! host='41360jnbpbb758w.za.sbicdirectory.com' port='443' count='1' !!! --- HUB 41360jnbpbb758w.za.sbicdirectory.com:443 is unavailable --- !!! host='48149jnbpbb041w.za.sbicdirectory.com' port='443' count='1' !!! --- HUB 48149jnbpbb041w.za.sbicdirectory.com:443 is unavailable --- !!! user='pips_lvl_one_user' password='pips_lvl_one' quota='user'" | rex "!!! --- HUB (?[^:]*):\d+\s(?[^-]*).*?password='(?[^']*)"   I'm running above rex command on splunk, it works when using it with "makeresults" command but when Im using it in my search it doesnt bring back any results