All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hello, I am trying to create an Analytic query that would show the top 5 BTs with Error counts. e.g. TransactionName  3 I'm not great at building SQL or Analytics queries. : ) Thanks f... See more...
Hello, I am trying to create an Analytic query that would show the top 5 BTs with Error counts. e.g. TransactionName  3 I'm not great at building SQL or Analytics queries. : ) Thanks for any help, much appreciated. Tom 
Please share a SPL to show if a certain event code ( Windows) from Security logs is being ingested into Splunk. I appreciate a response in advance.
Hello All,   So i have a field like below with JSON file       {"results_appcodes": [{"count": 2, "app_code": "XYZ", "group": "", "instance": "PQ1", "job_names": ["XYZ#cmd#johntest1", "XYZ#... See more...
Hello All,   So i have a field like below with JSON file       {"results_appcodes": [{"count": 2, "app_code": "XYZ", "group": "", "instance": "PQ1", "job_names": ["XYZ#cmd#johntest1", "XYZ#cmd#remetest"]}, {"count": 2, "app_code": "ZZZ", "group": "ABC1234", "instance": "PQ1", "job_names": ["ZZZ#ADM#cmd#pac", "ZZZ#cmd#GET_APP_CODE"]}, {"count": 1, "app_code": "ZZZ", "group": "", "instance": "PQ1", "job_names": ["ZZZ#cmd#mila3098"]}, {"count": 192, "app_code": "GKU", "group": "CAD45678", "instance": "PQ1", "job_names": ["ZZZ#cmd#test123"] ,["ZZZ#cmd#test890"], ["ZZZ#cmd#gola456"], ["ZZZ#cmd#test9990"] }}        Im using below query to break down the JSON file above  All the fields  count,app_code, group, instance are getting as expected but for  job_names  im unable to break down and that particular attrbute has a list of jobs underneath it Im looking for a query to get jobnames also        <<mysearch>>| spath input=results|rename unique_appcodes{}.* as * | eval x = mvzip(count,mvzip(app_code,mvzip(group,mvzip(instance,mvzip(instance,job_names))))) | mvexpand x | eval x = split(x, ",")| eval job_count=mvindex(x,0), app_code = mvindex(x,1) ,group=mvindex(x,2), instance = mvindex(x,3),job_names = mvindex(x,4) |table app_code job_count group instance job_names           Expected output       app_code count group instance job_names XYZ 2 PQ1 XYZ#cmd#johntest1,XYZ#cmd#remetest ZZZ 2 ABC1234 PQ2 ZZZ#ADM#cmd#pac,ZZZ#cmd#GET_APP_CODE              
When I move to the latest version of the Okta App (2.25.x) knowledge bundle replication  breaks with the following errors: "Failed to untar the bundle="D:\Program Files\Splunk\var\run\searchpeers\<... See more...
When I move to the latest version of the Okta App (2.25.x) knowledge bundle replication  breaks with the following errors: "Failed to untar the bundle="D:\Program Files\Splunk\var\run\searchpeers\<name>.bundle." Unable to distribute to peer named <indexer>at uri https://<indexer>:8089 because replication was unsuccessful. ReplicationStatus: Failed - Failure info: failed_because_BUNDLE_DATA_TRANSMIT_FAILURE I've noticed that prior to the installation knowledge bundle replication happened rather infrequently but after the install it's constant. My search bundles are all around 500MB.  Here's a couple of things I've tried I've tried increasing the bundle timeouts Checking for large lookup files in the Okta App -- they dont exist.  removing all knowledge bundle files on indexers and the search and letting them regenerate.  Completely removing the app from the searchhead and starting fresh.  When I remove the Okta app the error goes away. Okta and Splunk support have been little help so far.  Any suggestions on what could be causing this would be appreciated. Thanks. 
I want to do a multi-search on various systems looking for the src_ip and comparing that src_ip from those systems to a threat intel feed lookup (KV store). When I run the SPL, I get the following er... See more...
I want to do a multi-search on various systems looking for the src_ip and comparing that src_ip from those systems to a threat intel feed lookup (KV store). When I run the SPL, I get the following error: Multisearch subsearches might only contain purely streaming operations (subsearch 1 contains a non-streaming command). This is the lookup: lookup TF-ip-add indicator as src_ip OUTPUTNEW
1. How do I make my search string more readable?  It only works if it's all on one line.  I tried escaping new lines but splunk complains. 2. My query creates tables ok.  I want an alert to happen i... See more...
1. How do I make my search string more readable?  It only works if it's all on one line.  I tried escaping new lines but splunk complains. 2. My query creates tables ok.  I want an alert to happen if one of the table entries is zero.   so I added. blah blah | sort + "Appointments Processed" | where 'Appointments Processed' = 0 and "save as" an alert but when it is zero, it doesnt send me email alert?
I am using timewrap function to compare data for a particular day of the week with same day of the week for last 4 weeks. i.e comparing current wednesday to last 4 wednesdays. when i see the graph i... See more...
I am using timewrap function to compare data for a particular day of the week with same day of the week for last 4 weeks. i.e comparing current wednesday to last 4 wednesdays. when i see the graph it gives current week's wednesday as timescale on x axis, also when i hover the charts for previous wednesdays it mentions current wednesday (date) + 2 week's before or 1 week before or 3 weeks before. Is this splunk's limitation or is there a way that previous wednesday's data should show exact date of those previous 4 wednesdays.
Greetings to all, I'm having an issue with the Microsoft Teams TA.  After setting up the Subscription, I'm getting this error: message from "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/TA_MS_Tea... See more...
Greetings to all, I'm having an issue with the Microsoft Teams TA.  After setting up the Subscription, I'm getting this error: message from "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/TA_MS_Teams/bin/teams_subscription.py" subscription = create_subscription(helper, access_token, webhook_url, graph_base_url) ERROR ExecProcessor - message from "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/TA_MS_Teams/bin/teams_subscription.py" ERROR400 Client Error: Bad Request for url: https://graph.microsoft.com/v1.0/subscriptions If I'm using the subscription and test with curl on the HF where the TA is installed, I'm getting this answer once I got the token: {"@odata.context":"https://graph.microsoft.com/v1.0/$metadata#subscriptions","value":[]}
Need help with KVstore status. Why do I get "This health check item is not applicable" in MC in my ES while I have many KVstores?
Hello I have a dashboard with this search  sourcetype="Perfmon:Windows Time Service" counter="Computed Time Offset" if $host$="yes" [| inputlookup windows_hosts_srv_2016.csv | fields host | format... See more...
Hello I have a dashboard with this search  sourcetype="Perfmon:Windows Time Service" counter="Computed Time Offset" if $host$="yes" [| inputlookup windows_hosts_srv_2016.csv | fields host | format] | timechart max(Value) by host span=5m I want to add checkbox so the defualt search will be sourcetype="Perfmon:Windows Time Service" counter="Computed Time Offset" if $host$="yes" host=* | timechart max(Value) by host span=5m and if the client clicks on the checkbox then it will search by the first query  how it can be done ? thanks
Hello I develop a Splunk apps on a DEV platform In this apps, I am doing field extractions and log file parsing. As a consequence,  props.conf and transforms.conf files are regularly modified.  I... See more...
Hello I develop a Splunk apps on a DEV platform In this apps, I am doing field extractions and log file parsing. As a consequence,  props.conf and transforms.conf files are regularly modified.  If I want that my Splunk apps works fine in Production, do I have also to update props.conf and transforms.conf in my forwarder? Or on my indexer? Or both in forwarder and indexer ? Thanks a lot  
I am having below search string and suppose the file "magic_new.log" has no events and the requirement is to show that as output index=magic  source IN ("D:\\show\\magic.log", "D:\\show\\magic_new... See more...
I am having below search string and suppose the file "magic_new.log" has no events and the requirement is to show that as output index=magic  source IN ("D:\\show\\magic.log", "D:\\show\\magic_new.log", "D:\\show\\magic_old.log") | stats count by source | where count=0 current output- no results found expected output- source                                                    count D:\show\magic_new.log                0  (Note: Tried multiple solutions suggested in the community but none worked)
Hi  In July, 2021 Google has published new version of Android Gradle Plugin (AGP) 7.0.0 and Android Studio: https://developer.android.com/studio/releases/gradle-plugin#7-0-0 So far latest version ... See more...
Hi  In July, 2021 Google has published new version of Android Gradle Plugin (AGP) 7.0.0 and Android Studio: https://developer.android.com/studio/releases/gradle-plugin#7-0-0 So far latest version of AppDynamics plugin for Android is 21.6.0 When trying to build the project, there is such error probably caused by new API in latest AGP: Some problems were found with the configuration of task ':app:appDynamicsProcessProguardMappingDebug' (type 'ProcessProguardMappingFileTask'). - Type 'com.appdynamics.android.gradle.ProcessProguardMappingFileTask' property 'applicationName' is missing an input or output annotation. It is the same even if Proguard is disabled (although by obvious reasons we are not going to disable Proguard anyway) The issue is reproducible on sample project we created based on basic Android project to make sure it is not caused by our project setup: https://github.com/silin/appdynamics-mapping-upload-issues/tree/latest_gradle_plugin When we try to switch our project to latest versions of Android Studio and AGP, AppDynamics becoming a blocker for this. Dev team is really frustrated with this, because they cannot use latest tools for development, and because it is not the first time when AppD becomes a blocker we constantly have discussions of dropping AppDynimics as a monitoring tool. Could you please share some ideas about how to fix this or in what version of AppD and when it can be potentially fixed?
Hello i have a table that looks like this :  and i want it to look like this:   so the type values will be the header  what should i do ? thanks
Hi, I try to test a simple chart option "charting.legend.mode": "seriesCompare" via ChartView components of the Splunk Web Framework . I want the legend display/compare all  differences point values... See more...
Hi, I try to test a simple chart option "charting.legend.mode": "seriesCompare" via ChartView components of the Splunk Web Framework . I want the legend display/compare all  differences point values of 4 lines as we move alongs the line.  Is this a limite of ChartView or i am missing something here? thanks for your time!!! able to do in Splunk Entreprise only: g.highcharts legend not able to display difference point values. Seem like, option standard is the only avaiable option.  
0
Getting the below error for one panel of a Dashboard while exporting as PDF. Splunkd daemon is not responding: ('Error connecting to https://[::1]:8089/services/search/jobs/xxxxxx_ _xxxxxx_c29ueV9n... See more...
Getting the below error for one panel of a Dashboard while exporting as PDF. Splunkd daemon is not responding: ('Error connecting to https://[::1]:8089/services/search/jobs/xxxxxx_ _xxxxxx_c29ueV9nc2lydF9zb2M__RMD5d1f52a5d3044c8e9_1630297191.55342_74FD1776-A60D-44 F0-9CC3-A343C2FFBFAC/results: The read operation timed out',)
Is this possible to transform a data set from :   Time User Number of Errors 9 pm Josh 2 9 pm Andy 1 10 pm Josh 0 10 pm Andy 1 11 pm Josh 1 11 pm Andy 3 ... See more...
Is this possible to transform a data set from :   Time User Number of Errors 9 pm Josh 2 9 pm Andy 1 10 pm Josh 0 10 pm Andy 1 11 pm Josh 1 11 pm Andy 3 to :   Time User Number of Errors 9 pm Josh 2 9 pm Andy 1 9 pm Total Number of Errors 3 10 pm Josh 0 10 pm Andy 1 10 pm Total Number of Errors 1 11 pm Josh 1 11 pm Andy 3 11 pm Total Number of Errors 4 ?  I've tried to use  :    <insert index here> | convert num("Number of Errors") as NumberofErrors |eval Total_Number_of_Errors= Josh + Andy |table Time User Number of Errors   However  its erroring out when i try to run this query .  
I would like to write in splunk a nested if loop: What I want to achieve: if buyer_from_France:                     do eval percentage_fruits                    if percentage_fruits> 10:         ... See more...
I would like to write in splunk a nested if loop: What I want to achieve: if buyer_from_France:                     do eval percentage_fruits                    if percentage_fruits> 10:                                                          do summation                                                          if summation>20:                                                                                           total_price                                                                                            if total_price>$50:                                                                                                                       do(trigger bonus coupon) My current code (that works): > | eventstats sum(buyers_fruits) AS total_buyers_fruits by location > | stats sum(fruits) as buyers_fruits by location buyers > | eval percentage_fruits=fruits_bought/fruits_sold > | table fruits_bought fruits_sold buyers > | where percentage_fruits > 10 > | sort - percentage_fruits How do I complete the syntax/expression for the 2nd (summation) and consequently, 3rd (total price), 4th if-loop (trigger)?
I am using timewrap to compare data for a particular day of the week with same day of the week for last 4 weeks. i.e comparing wednesday to last 4 wednesday's. when i see the graph it gives current ... See more...
I am using timewrap to compare data for a particular day of the week with same day of the week for last 4 weeks. i.e comparing wednesday to last 4 wednesday's. when i see the graph it gives current week's wednesday as timescale on x axis, also when i hover the charts for previous wednesday it still mentions current wednesday + 2 week's before. Is this splunk's limitation or is there a way that previous wednesday's data should show exact date of those previous 4 wednesdays.