All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

How do we get Linux patching details in Splunk
Hi what is the spl command to extract users. Here is the sample: 2021-09-12 21:40:03,938 ERROR [APPNAME] User H83952 invalid: javax.security.auth.login.LoginException: 2021-09-12 21:40:03,938 ERR... See more...
Hi what is the spl command to extract users. Here is the sample: 2021-09-12 21:40:03,938 ERROR [APPNAME] User H83952 invalid: javax.security.auth.login.LoginException: 2021-09-12 21:40:03,938 ERROR [APPNAME] User 83944 invalid: javax.security.auth.login.LoginException: 2021-09-12 21:40:03,938 ERROR [APPNAME] User A_Frok invalid: javax.security.auth.login.LoginException: expected output: H83952 83944 A_Frok Thanks,
Hi, I am looking to compare a field value against the results of an ldapsearch to check whether the value is present or not. The Use Case is basically that I want to detect if a cloud user account i... See more...
Hi, I am looking to compare a field value against the results of an ldapsearch to check whether the value is present or not. The Use Case is basically that I want to detect if a cloud user account is created in our O365 environment, and that same user name does not exist in our on-prem Active Directory. I have the below SPL which returns newly created users in my O365 environment. The below returns a field named "user". index="o365_log" action=created command="Add user." I now want to search my Active Directory domain to see if this user exists or not. If it doesnt exists in Active Directory, I want the search to detect it and output the user name.  I am using ldapsearch and searching where the userPrincipleName is the same as the value of the user field. The SPL below is what I am using: | ldapfilter domain=default search="(userPrincipalName=$user$)" attrs="cn,userPrincipalName"  The above SPL works, however the problem I have is that Im not sure how to combine these two lines SPL together so that it performs the check and only output' users which are not found from the ldapsearch. Can somebody help? Thanks. 
Hi, In a field status contains two values one is failure and another is success. Where in failure it contains some description values also an null value. Also in success it contain description as ... See more...
Hi, In a field status contains two values one is failure and another is success. Where in failure it contains some description values also an null value. Also in success it contain description as null value. As I am confused how to check null condition as it contains in both failure and success descriptions.   Regards, Madhusri R  
Hello Team, As we are parsing logs from Linux machine to Splunk indexer via Splunk Universal Forwarder in Linux machine, from monitor input paths "var/logs" am getting data in indexers but am not ge... See more...
Hello Team, As we are parsing logs from Linux machine to Splunk indexer via Splunk Universal Forwarder in Linux machine, from monitor input paths "var/logs" am getting data in indexers but am not getting data from this path "monitor:///opt/apps/mule-runtimes/mule-ee-runtime-1/logs" please help what to do, for reference please check the below snap.
Hello all, I am struggling with customizing my Splunk ES's Incident Review panel. I have integrated Suricata IDS logs to ES (using Splunk CIM and TA-Suricata) and I would like to output Suricata ale... See more...
Hello all, I am struggling with customizing my Splunk ES's Incident Review panel. I have integrated Suricata IDS logs to ES (using Splunk CIM and TA-Suricata) and I would like to output Suricata alerts as notable events in Splunk ES. Facts: 1. I have created a Splunk Correlation search in Content Management "Suricata Medium Severity Alert" which has a custom search:   index=suricata sourcetype=suricata event_type=alert alert.severity=2   2. In Adaptive Response Actions I added a Notable with the following custom settings: Title: $signature$  (in order to output the Suricata Alert Signature Title) Description: A medium severity alert ($signature_id$) was triggered on $src$ Notes: - Search runs every 5minutes. - I save and enable the Correlation search and I see that a Saved Search "Threat - Suricata Medium Severity Alert - Rule" is created. What is the problem: - In the Incident Review console though the new Notable's "Title" has the Saved Searches' title ("Threat - Suricata Medium Severity Alert - Rule") and not the custom title ($signature$) (ET POLICY SMB2 NT Create AndX Request For an Executable File) set on the Notable action event. - Description: is "unknown"   Notes: - The Notable event is successfully created and it contains all variable fields (src, signature, signature_id). - All fields are shown on Additional info on the notable, but the point is that variables do not show Troubleshooting done so far: - Deleted and recreated Corellation searches and Saved Searches - Restarted Splunk - Rebooted OS Splunk Version: 6.2.2 (Distributed Environment) Splunk ES: 6.6.0 Splunk CIM: 4.20.0 Any help would be appreciated. Regards, Chris
I have a search query to display external files shares that are active (Sharepoint/Onedrive).     This is working and shows us when file shares to third parties are still active. index=o365 file_... See more...
I have a search query to display external files shares that are active (Sharepoint/Onedrive).     This is working and shows us when file shares to third parties are still active. index=o365 file_path=* user=urn* OR TargetUserOrGroupType=Guest | fillnull value="-" | dedup UniqueSharingId TargetUserOrGroupName | where NOT Operation=="RemovedFromSecureLink" |stats latest(_time) by user Operation file_path file_name vendor_product TargetUserOrGroupName UniqueSharingId The issue we have is if a user just deletes the file share folder (so no longer an active share) the dashboard still displays the share as active.   I need to append the following search and match to the unique sharing location to display if the file/folder has been deleted: index=o365 Operation=FileDeleted       TIA
Hi all,    I have two chart queries to get the success count and error count which are working as expected.  Now I want to add the both and get the total count from both columns.  Query 1:  index=... See more...
Hi all,    I have two chart queries to get the success count and error count which are working as expected.  Now I want to add the both and get the total count from both columns.  Query 1:  index=dev | rex "\"tracePoint\\\\\"\s:\s\\\\\"(?<tracePoint>[^\\\]+)" | rex "\"correlationId\\\\\"\s:\s\\\\\"(?<correlationId>[^\\\]+)" |search app="project1" OR app="project2" OR app="project3" OR app="project4" |where tracePoint="EXCEPTION" |chart count(app) over app by dc(correlationId) Query 2:  index=dev | rex "\"tracePoint\\\\\"\s:\s\\\\\"(?<tracePoint>[^\\\]+)" | rex "\"correlationId\\\\\"\s:\s\\\\\"(?<correlationId>[^\\\]+)" |search app="project1" OR app="project2" OR app="project3" OR app="project4" |where tracePoint="END" |chart count(app) over app by dc(correlationId) I tried with 'appendcols', but it is not working, can anyone help me on this.  Thanks in Advance.
Hi All, When trying to pull AdminAudit logs from Exchange to Splunk we are only receiving the following log (Which is divided to 2 logs): First log: WARNING: An unexpected error has occurred and a... See more...
Hi All, When trying to pull AdminAudit logs from Exchange to Splunk we are only receiving the following log (Which is divided to 2 logs): First log: WARNING: An unexpected error has occurred and a Watson dump is being generated: Object reference not set to an instance Second log: of an object.     Can please someone explain how to resolve this issue and get proper admin audit logs from exchange?
Hi All We have a distributed environment (no cluster). Splunk Enterprise Version 8.1.3 Is there a way to create a dashboard for all search peers (indexers), where I can see there CPU, Memory and D... See more...
Hi All We have a distributed environment (no cluster). Splunk Enterprise Version 8.1.3 Is there a way to create a dashboard for all search peers (indexers), where I can see there CPU, Memory and Disk Usage?
There are some keywords that cannot be searched after changing the App. Even more specific keywords within a specific field are not searchable. There is no problem with permissions, but do you know... See more...
There are some keywords that cannot be searched after changing the App. Even more specific keywords within a specific field are not searchable. There is no problem with permissions, but do you know anything about it?
I want to onboard azure signin logs to my splunk. I installed MS azure add-on for splunk on one HF and completed the authentication steps and app registration. Please suggest whats going wrong. Am... See more...
I want to onboard azure signin logs to my splunk. I installed MS azure add-on for splunk on one HF and completed the authentication steps and app registration. Please suggest whats going wrong. Am getting below error.  INFO pid=4495 tid=MainThread file=splunk_rest_client.py:_request_handler:105 | Use HTTP connection pooling INFO pid=4495 tid=MainThread file=setup_util.py:log_info:117 | Proxy is not enabled! ERROR pid=4495 tid=MainThread file=base_modinput.py:log_error:309 | _Splunk_ Unable to obtain access token
Hi , I want to add a text box in a dashboard panel and the manual input value of that textbox should be added to a new column in an already existing table. I understand that this can be done by loo... See more...
Hi , I want to add a text box in a dashboard panel and the manual input value of that textbox should be added to a new column in an already existing table. I understand that this can be done by lookup to save the values but i am not sure how to go ahead with it. This is the data format of the table i have with sample data(the original data i have is confidential). EMAIL NAME IP ID(new column) nish123@gmail.com Nishanth 10.10.10.0   abc098@gmail.com ABC 224.0.0.0   amit187@gmail.com Amit Sharma 63.125.0.0      I want to add a text box to this panel whose values should be inputted into ID column based on the unique value of EMAIL. and i want to save this table with the new values of ID.  How can this be done?? Any help would be appreciated.thanks
Hi Splunk team, I would like to receive your dedicated help.  I have a string field, the field's structure is name_timestamp.  The name contains underscores between words, after the name, there is ... See more...
Hi Splunk team, I would like to receive your dedicated help.  I have a string field, the field's structure is name_timestamp.  The name contains underscores between words, after the name, there is another underscore. Finally, there is a full date. for example: this_is_an_example_09_13_2021. My goal is to extract the name from this field. for this example, I would like to receive this_is_an_example.  Is it possible? Thanks in advance! 
Hi, We are receiving Cisco ACI System Messages via our syslog infrastructure. I have looked at the Cisco ACI Add-On to get the correct sourcetype and parsing, but nothing seems to match any of the... See more...
Hi, We are receiving Cisco ACI System Messages via our syslog infrastructure. I have looked at the Cisco ACI Add-On to get the correct sourcetype and parsing, but nothing seems to match any of the patterns of the data. Example data: 2021-09-13T06:52:21.666000+02:00 ACI-xxxxx-APIC001 %LOG_-3-SYSTEM_MSG [F1547][raised_clearing][packets-dropped][major][dbgs/ac/svpcpath-115-116-to-167/fault-F1547] 100% of packets were received in excess during the last collection interval 2021-09-13T06:52:21.663000+02:00 ACI-xxxxx-APIC001 %LOG_-3-SYSTEM_MSG [F1545][raised][packets-dropped][major][dbgs/ac/dvpcpath-167-to-117-118/fault-F1545] 100% of packets were dropped during the last collection interval 2021-09-13T06:51:53.326000+02:00 ACI-xxxx-APIC001 %LOG_-3-SYSTEM_MSG [F1547][raised_clearing][packets-dropped][major][dbgs/ac/svpcpath-117-118-to-167/fault-F1547] 100% of packets were received in excess during the last collection interval What sourcetype should this be? Is there an app for this? What am I missing here in my thinking?
So I'm trying to change a token when i click a button. Tried it like this: require([ 'jquery', 'splunkjs/mvc', 'splunkjs/mvc/tableview', 'splunkjs/mvc/simplexml/ready!' ], function ... See more...
So I'm trying to change a token when i click a button. Tried it like this: require([ 'jquery', 'splunkjs/mvc', 'splunkjs/mvc/tableview', 'splunkjs/mvc/simplexml/ready!' ], function ( $,mvc,TableView) { var tokens = mvc.Components.get('default'); var sub_tok = mvc.Components.get("submitted"); $(document).on("click","#testbtn",function(){ tokens.set("btnClick", "Click"); sub_tok.set("btnClick", "Click"); }); }); And like this: require([ 'jquery', 'splunkjs/mvc', 'splunkjs/mvc/tableview', 'splunkjs/mvc/simplexml/ready!' ], function ( $,mvc,TableView) { var tokens = mvc.Components.get('default'); var sub_tok = mvc.Components.get("submitted"); $("#testbtn").on("click",function(){ tokens.set("btnClick", "Click"); sub_tok.set("btnClick", "Click"); }); }); But its not working. When i try the code in jsFiddle it works as intended. (leaving out the splunk stuff) It's just a jQuery click event, so I don't know what I'm doing wrong. Further more when I try the whole think with a slider, it works. require([ 'jquery', 'splunkjs/mvc', 'splunkjs/mvc/tableview', 'splunkjs/mvc/simplexml/ready!' ], function ( $,mvc,TableView) { var tokens = mvc.Components.get('default'); var sub_tok = mvc.Components.get("submitted"); $("#slider-range").on("input change", function () { tokens.set("slider_value", $(this).val()); sub_tok.set("slider_value", $(this).val()); }); });  Here ist the xml code: <dashboard script="testscript.js" theme="dark"> <label></label> <fieldset submitButton="false"> <html> <label>Slider</label> <input type="range" id="slider_input" value="10" min="0" max="20" step="1"/> <button id="testbtn">ghfhfhfhfh</button> </html> </fieldset> <row> <panel> <title>$slider_value$____$btnClick$</title> <table> <search> <query>|makeresults | eval slider_value=$slider_value$</query> <earliest>-1h@h</earliest> <latest>now</latest> </search> <option name="refresh.display">progressbar</option> </table> </panel> </row> </dashboard> I there is a simple solution to this and thanks in advance.
The error is  ;- ( Clustering: Peer Node The cluster peer is unable to handle request at this time. This means either the cluster peer unable to communicate w/ the cluster manager OR the clust... See more...
The error is  ;- ( Clustering: Peer Node The cluster peer is unable to handle request at this time. This means either the cluster peer unable to communicate w/ the cluster manager OR the cluster manager does not have <repFactor> peers added to the cluster. Check the cluster manager dashboard and/or manager_uri/secret settings.    
Hi @gcusello , Background: We tried to upgrade our existing environment(7.1.3) to higher version 8.1 but we were unable to do so because of some issue and failed multiple times to upgrade our Index... See more...
Hi @gcusello , Background: We tried to upgrade our existing environment(7.1.3) to higher version 8.1 but we were unable to do so because of some issue and failed multiple times to upgrade our Indexer and also we couldn't get much help from Splunk support. Present scenario: Instead of upgrading, we planned to install Splunk on new servers (Indexer & SH) and we were able to do so and luckily we also able to map Indexer and SH. Mainly we intend to built everything in Splunk from scratch(Replica to our existing Splunk environment). Next step I did was to find the hosts from where the indexes are getting data but its difficult to get all the indexes that are used by different apps(Number of Dashboard is high). Is there any query to get index/s that are being used by different Apps? Also, can you please help me to guide how to achieve this(Steps)? Regards, Rahul  
I need to make a list of Default Indexes assigned to each user role by default & where do I look to edit the settings? I need to learn how to specify Indexes to Splunk user roles please. Thank u very... See more...
I need to make a list of Default Indexes assigned to each user role by default & where do I look to edit the settings? I need to learn how to specify Indexes to Splunk user roles please. Thank u very much in advance.
Is there a security issue or problem if a saved search don't use index name for searching? Should all saved searches use index names for searching? Thank u very much in advance.