All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hello, we have problem with useACK, there are known bugs with our UF 7.3.4 : https://docs.splunk.com/Documentation/Splunk/7.3.4/ReleaseNotes/KnownIssues : SPL-171178, SPL-167307, SPL-202078 Disabli... See more...
Hello, we have problem with useACK, there are known bugs with our UF 7.3.4 : https://docs.splunk.com/Documentation/Splunk/7.3.4/ReleaseNotes/KnownIssues : SPL-171178, SPL-167307, SPL-202078 Disabling indexer ack from forwarder is not acceptable in our case so which solution is best? Schedule regular restarts? Downgrade? Thanks for your contributions.  
I have a problem similar to this: Scripted Input timeout . In modular input, i use python script to collect data, and in most cases, the single collection takes 10 minutes. But my interval is set t... See more...
I have a problem similar to this: Scripted Input timeout . In modular input, i use python script to collect data, and in most cases, the single collection takes 10 minutes. But my interval is set to 5 minutes. Splunk will run the first one and wait until it finishes to start the next one? Right? And the missed scheduling will be directly ignored?
Hi all, Just note that the macro 'cim_Authentication_indexes` of Splunk_SA_CIM has definition like following: [cim_Authentication_indexes] definition = () What does it mean? Sorry for the newbie... See more...
Hi all, Just note that the macro 'cim_Authentication_indexes` of Splunk_SA_CIM has definition like following: [cim_Authentication_indexes] definition = () What does it mean? Sorry for the newbie question.   Thanks a lot. Regards
Hello,  Whenever I tried to create a notable event by "Configure -> Incident Management -> New Notable Event", the website seems to crash, giving a weird error     I wanted to create a notabl... See more...
Hello,  Whenever I tried to create a notable event by "Configure -> Incident Management -> New Notable Event", the website seems to crash, giving a weird error     I wanted to create a notable event so that my Incident Review is not blank
Hi, Im using ver 4.1.5 of the cloud services Add-on on my HF Splunk ver 8.0.9. I've configured an Azure App Account in the App and a input for collecting Azure Devops Audit data. But im not getting... See more...
Hi, Im using ver 4.1.5 of the cloud services Add-on on my HF Splunk ver 8.0.9. I've configured an Azure App Account in the App and a input for collecting Azure Devops Audit data. But im not getting any logs in to Splunk. Im getting below warning message in "splunk_ta_microsoft_cloudservices_mscs_azure_event_hub_AzureDevopsAudit.log" 2021-09-09 08:22:45,926 level=WARNING pid=84608 tid=Thread-2 logger=uamqp.authentication.cbs_auth pos=cbs_auth.py:handle_token:122 | Authentication Put-Token failed. Retries exhausted. CPU rises to 90% when input is enabled. Any ideas?   Regards, Martin
Hey splunkers,  How can I correlate rules in Splunk from 2 data sources?  The events for example: OKTA - privilege granted index="network" sourcetype="OktaIM2:log" eventType="user.account.privile... See more...
Hey splunkers,  How can I correlate rules in Splunk from 2 data sources?  The events for example: OKTA - privilege granted index="network" sourcetype="OktaIM2:log" eventType="user.account.privilege.grant" + Windows - Event Auditing disabled index="WinEventLog" sourcetype="WinEventLog" EventCode="4719" AuditPolicyChanges="removed" I want to correlate first Okta event and then the Windows event with the same field (for example Username) in 10 min.    
I am running SPLUNK version 8.0.10 with Lookup Editor version 3.4.6.  Noted that I have a problem in my CSV's wherein if I scroll using my mouse to the bottom of a long list (say 300 lines), the scro... See more...
I am running SPLUNK version 8.0.10 with Lookup Editor version 3.4.6.  Noted that I have a problem in my CSV's wherein if I scroll using my mouse to the bottom of a long list (say 300 lines), the scroll bar jumps back to the top of the CSV.  I have to literally click on the side scroll bar and drag to the bottom to perform any edits (particularly if I want to add a new line).   I have seen there have been other bugs with 3.4.6 and the only version that is "supported" under 8.0 is 3.4.6.  3.5.0 which is available for download only supports 8.1+.    
hi. I have a txt file include many strings, and  many logs from my web server that indexed. I want to find the logs that at least match with one of the string in txt file. how to search and query ... See more...
hi. I have a txt file include many strings, and  many logs from my web server that indexed. I want to find the logs that at least match with one of the string in txt file. how to search and query for this goal? thanks. for example: txt file: mosConfig.absolute.path and logs: http://localhost/index.php?option=com_sef&Itemid=&mosConfig.absolute.path=[shell.txt?] and output: http://localhost/index.php?option=com_sef&Itemid=&mosConfig.absolute.path=[shell.txt?]
Hello Gurus! I am sure some people may have run in to this.   I am using extract command to parse fields from multi line unstructured event, but the data values are encapsulated by single quotes. H... See more...
Hello Gurus! I am sure some people may have run in to this.   I am using extract command to parse fields from multi line unstructured event, but the data values are encapsulated by single quotes. Here is the example : ====EVENT 1======== 2021-09-08 00:00:00 ABC status - performance event     name : 'James Bond'     address : 'USA'     age : '100'     occupation : 'spy' performance event END ================== So the the following event, I am using transforms to  transforms.conf [performance_data] DELIMS = "\r\n", ":" So above transforms partially works.  The problem is the values has single quote ' encapsulated. Like this Field name "name"  with value "'James Bond'".   single quote included.  How can I get rid of the single quote?
I have logs in the format of json where message is the key and message contains the value mentioned below   message:  <ErrorMessage>E-delivery failed<ErrorMessage> When i am searching like below ... See more...
I have logs in the format of json where message is the key and message contains the value mentioned below   message:  <ErrorMessage>E-delivery failed<ErrorMessage> When i am searching like below in the splunk, able to search the events index="*" source="*" "E-delivery failed" If i want to display the count of E-delivery failed string, the results are not fetching as the value under message tag is xml. Query used is: index="*" source="*" | eval type=case(like(message, "%E-delivery failed%"),"e delivery failed")|stats count as Results by type With the above query not able to get any results. Please help me with the query.   Result should be: type                                  count e delivery failed             10  
Hi,  I have a data source of  call records for phone calls. This data contains a field "A_Number". I want to class any "A_Number" that begins with 04 as "Mobile" and anything else as "Fixed". Then I ... See more...
Hi,  I have a data source of  call records for phone calls. This data contains a field "A_Number". I want to class any "A_Number" that begins with 04 as "Mobile" and anything else as "Fixed". Then I want to timechart a count of fixed and mobile events. 
I found that the count with the 'Other' slice in the pie graph visualization available in splunk is not actually the count of events. From documentation I found that it is the count of 'Slices' with... See more...
I found that the count with the 'Other' slice in the pie graph visualization available in splunk is not actually the count of events. From documentation I found that it is the count of 'Slices' with less contribution.  Is there any way to print the count of events with the 'Other' slice? Checked documentations and forums. Couldnt find any anything.
I'm running Splunk 8.2.2 in a docker container. I'm using a separate app with a scripted input to get data into Splunk via a bash script. That script works perfectly, except when the source API scr... See more...
I'm running Splunk 8.2.2 in a docker container. I'm using a separate app with a scripted input to get data into Splunk via a bash script. That script works perfectly, except when the source API screws up, or when I delete the index and need to backfill all of the previous data. The scripted input is setup in inputs.conf as: [script://$SPLUNK_HOME/etc/apps/app/bin/app.sh] interval = */5 * * * *   Is there a way to manually run a script one time and have splunk consume the output?  I'd really like to avoid setting up a regular monitor, and have splunk consume a regular file just for a backfill operation.  I'd also like to avoid modifying the working scripted input.   Thank you for any suggestions you can provide.
I want use app F5 Network analytics to monitor vs, pool. I installed app F5 Network in splunk but no traffic display. Pls, guide me config to see tra  
I am having a Timeline visualization where Date wise, engine wise status is displayed for an analytic, whether the execution is success or failure. Currently it is represented in the form of bubbles ... See more...
I am having a Timeline visualization where Date wise, engine wise status is displayed for an analytic, whether the execution is success or failure. Currently it is represented in the form of bubbles but then need to represent the status in the form of vertical lines. If there is a way could anyone help me on this?
Hi, I am having a Timeline visualization where Date wise, engine wise status is displayed for an analytic, whether the execution is success or failure. Now I need to display a table on clicking an e... See more...
Hi, I am having a Timeline visualization where Date wise, engine wise status is displayed for an analytic, whether the execution is success or failure. Now I need to display a table on clicking an event in the visualization by passing analytic name, execution date time and engine number. Could you please help me with creating a drill down table for this? Thanks
I need help with regex for parsing a URL   The URL can be  a/b/c, a/b/c/d or a/b/c/d/e In any case I need the resource of the URL -  c d e respectively for the above URLs. Can you help with a rege... See more...
I need help with regex for parsing a URL   The URL can be  a/b/c, a/b/c/d or a/b/c/d/e In any case I need the resource of the URL -  c d e respectively for the above URLs. Can you help with a regex which can give the value after the last /   
Need help on creating a list of all UFs, HFs, their versions please. We have them on Windows & RHEL boxes. Thank u
Hi folks, I'm trying to append multiple field values to a csv as a result of a search. The csv file contains a list of seen hashes.  I have the following query: index=AV NOT([ | inputlookup Hashes... See more...
Hi folks, I'm trying to append multiple field values to a csv as a result of a search. The csv file contains a list of seen hashes.  I have the following query: index=AV NOT([ | inputlookup Hashes.csv | stats values(hashes) AS search| format ]) So, the question here is, how can I add the resulting hash values from the previous search into the CSV? I already try with the following qery with no results: | foreach * [|append [makeresults | eval hashes=file_hash] | fields hashes | outputlookup Hashes.csv]
How can i create a scheduled report that runs every hour and makes GET requests to fetch data from an open source.   basically querying the same page and updating latest data available on premises.