All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hello Splunkers, Has anyone on-boarded Oracle cloud recently, Please share your experience and help with the right Add-on to be used as the one available on Splunk base says not supported anymore. ... See more...
Hello Splunkers, Has anyone on-boarded Oracle cloud recently, Please share your experience and help with the right Add-on to be used as the one available on Splunk base says not supported anymore. Thanks in advance, regards, Moh
As described in the title. We want to show p50, p90 and p99 of the metrics we created using information points. I don't know how can I do it. Need  you help. Thanks very much.
When I search using the Python SDK, I don't seem to see any fields, other than the very basic ones like host, source, sourcetype... in the results. Is there a way to get the search to return all the ... See more...
When I search using the Python SDK, I don't seem to see any fields, other than the very basic ones like host, source, sourcetype... in the results. Is there a way to get the search to return all the same pre-extracted fields I get when using the splunk search GUI ? like fields automatically extracted by Splunk, such as those that come in field1=value1 ...etc? Thanks, Mohamed.
I have a dashboard with this query:       | dbxquery connection=abcd-local query="SELECT DATE_FORMAT(date(dts),GET_FORMAT(DATE,'USA')) as rate_date, category_id, count(*) FROM url_directory W... See more...
I have a dashboard with this query:       | dbxquery connection=abcd-local query="SELECT DATE_FORMAT(date(dts),GET_FORMAT(DATE,'USA')) as rate_date, category_id, count(*) FROM url_directory WHERE category_id in (1,2,3) and dts >= now() - INTERVAL 1 MONTH group by rate_date, category_id" | eval category_id = case( category_id=="1", "Scam", category_id=="2", "Phishing", category_id=="3", "Malicious", 1==1, category_id)       It returns a table like this: Scam 5 2/1/2023 Phishing 18 2/1/2023 Malicious 23 2/1/2023 Scam 8 2/2/2023 Phishing 12 2/2/2023 Malicious 17 2/2/2023 I want to turn that table into a Pivot Table like this: Scam Phishing Malicious 2/1/2023 5 18 23 2/2/2023 8 12 17 ... What can I add to the query (or how can I change the query) to create that pivot table in a dashboard? Thanks!
I have a table of data with values like this: String         Numeric Client 1      99.9 Client 2      99.2 Client 3      93.8 Client 4      89.0 Client 5      72.9 and so on for miles.... I... See more...
I have a table of data with values like this: String         Numeric Client 1      99.9 Client 2      99.2 Client 3      93.8 Client 4      89.0 Client 5      72.9 and so on for miles.... I would like to add a column which outputs Decile rank of the clients based on their numeric value.  Can you point me in the right direction please? Thank you, -MD
Hello, I am using the splunk-utils SDK to try and search Splunk 9.0.4 from an external app. I am able to submit an initial search with a bearer token and can see my local instance receiving it and ... See more...
Hello, I am using the splunk-utils SDK to try and search Splunk 9.0.4 from an external app. I am able to submit an initial search with a bearer token and can see my local instance receiving it and returning a search SID. However, when I try to retrieve the results with getData, I get an error saying "Invalid Version: undefined"     // https://splunkui.splunk.com/Packages/splunk-utils/Search const n = await getData( sid, "results", { output_mode: "json_cols" }, { splunkdPath: serverURL, app: "myapp", owner: "nobody"}, headers )     Tracing the node_modules, I can see that the getData in search.js is trying to figure out the version, but I am not following how.  This seems to be the line that is determining if v2 should be used:     // Use V2 endpoints only where available // https://docs.splunk.com/Documentation/Splunk/latest/RESTREF/RESTsearch#Semantic_API_versioning var V2_ENDPOINTS = ['results', 'results_preview', 'events']; var endpointVersion = V2_ENDPOINTS.includes(endpoint) && gteSplunkVersion(_config.versionLabel, '9.0.2', '9.0.2209') ? '/v2' : '';     I have been looking at this example from @ryanoconnor and @nhaq but am not seeing how the right API version is being determined. https://github.com/splunk/react_search_example/blob/main/src/App.js Any ideas how to update my call to tell my getData what version to use?  I am assuming this is unhappy about a missing version but maybe it's something else... Full Error:     index.js:1 TypeError: Invalid Version: undefined at new SemVer (semver.js:19:1) at patch (patch.js:2:1) at gteSplunkVersion (search.js:53:1) at getData (search.js:326:1) at loadResults (splunksearch.js:80:1) at retrieveJob (splunksearch.js:56:1)      
I'm currently adding notes through a playbook via Python automation. I'll have a formatted string:     f'<a href="https://www.url.com"> Link Label </a>'     Then when add it to the t... See more...
I'm currently adding notes through a playbook via Python automation. I'll have a formatted string:     f'<a href="https://www.url.com"> Link Label </a>'     Then when add it to the task notes, the inside of the tag gets wiped out and I'm left with:     <a> Link Label </a>     I've seen workable links in the notes, how do I go about this?
Hello Splunk experts - I am trying to create a query that shows the difference in results from two distinct time frames.  Original search:   index=summary_nexpose | table AssetName, cveID, Exp... See more...
Hello Splunk experts - I am trying to create a query that shows the difference in results from two distinct time frames.  Original search:   index=summary_nexpose | table AssetName, cveID, Exposure | mvcombine delim=",", cveID | nomv cveID | eval numberCVEs=mvcount(split(cveID,",")) | rename numberCVEs AS "Number of CVEs"   What I need to do is add two timeframes: results from 30 days ago vs. results from today, and then show the difference in events between those two timeframes.
Regarding Windows Print Monitoring, what do each of the "operation" field values mean, i.e., add, set, baseline? For example, in the event below, what does "operation=set" mean? 04/21/2014 13:51:... See more...
Regarding Windows Print Monitoring, what do each of the "operation" field values mean, i.e., add, set, baseline? For example, in the event below, what does "operation=set" mean? 04/21/2014 13:51:59.486 operation=set type=Printer ComputerName=ops-sys-001 printer=HP LaserJet M3035 mfp PCL6 share= port=IPAddress driver=HP LaserJet M3035 mfp PCL6 comment=None location= separate_file= print_processor=hpzppwn7 data_type="RAW" parameters= status="normal" attributes=979 priority=6 default_priority=2 jobs=8 average_PagePerMinute=73  
If I am starting with this query: index=anIndex sourcetype=aSourcetype ( aJobName AND "COMPLETED OK" ) The job im intereted in runs once perday. I would like completion time on the Y Axis and the ... See more...
If I am starting with this query: index=anIndex sourcetype=aSourcetype ( aJobName AND "COMPLETED OK" ) The job im intereted in runs once perday. I would like completion time on the Y Axis and the day on the X axis. I found this previous piece of code but am not sure how to adapt to my query results ? | eval _time=strptime(timestamp,"%F %T.%Q") | eval t=split(substr(timestamp, 12, 8),":") | eval h=mvindex(t,0), m=mvindex(t,1), s=mvindex(t,2) | eval v=(h)+(m/100) | bin _time span=1d | chart max(v) over _time by job  
Hello Splunk, I am using website monitoring app to monitor multiple sites and I want to get availability for individual sites and add it to Status Overview Dashboard. Any help is appreciated. ... See more...
Hello Splunk, I am using website monitoring app to monitor multiple sites and I want to get availability for individual sites and add it to Status Overview Dashboard. Any help is appreciated. Thanks in advance!
I am trying to find entries between a date-time range based on a field in the event 'Date'. It date-time value of the field is in the format - %Y-%m-%d %H:%M:%S.   I am using below query:    ... See more...
I am trying to find entries between a date-time range based on a field in the event 'Date'. It date-time value of the field is in the format - %Y-%m-%d %H:%M:%S.   I am using below query:       (index=myindex) ((strptime(Date, "%Y-%m-%d %H:%M:%S")>=strptime("2023-02-11 00:00:00", "%Y-%m-%d %H:%M:%S")) AND (strptime(Date, "%Y-%m-%d %H:%M:%S")>=strptime("2023-02-11 23:59:59", "%Y-%m-%d %H:%M:%S")))         It is giving me below Error:       Error in 'search' command: Unable to parse the search: Comparator '>=' has an invalid term on the left hand side: (Date "%Y-%m-%d %H:%M:%S").         Sample Data:       { "InterfaceNumber": "I-XXXX", "SystemCode": "sys", "Element": "JobID:bw0a104of", "Data": "", "Severity": "Error", "ProcessContext_ProcessId": "bw0a104of", "Subject": "/api/login", "Date": "2023-02-14 12:25:01", "ErrorMessages": "This is an Error", "ProcessContext_ProjectName": "MyApp.application", "HostName": "localhost.mydomain.com", "ProcessContext_RestartedFromCheckpoint": false, "ProcessContext_EngineName": "MyApp" }         Not sure what I am doing wrong. Any help appreciated. --
Hello All, I am using the Splunk Cisco TA plugin to get all kinds of data from the cisco devices reporting to splunk. I am sending the cisco logs direct from the cisco host to splunk. Is there a wa... See more...
Hello All, I am using the Splunk Cisco TA plugin to get all kinds of data from the cisco devices reporting to splunk. I am sending the cisco logs direct from the cisco host to splunk. Is there a way to get the host only out of a search?, I mean without the events per host. Just the deduped hosts using "sourcetype="cisco:ios" in the search field for a given time span (24hrs, 30 days, etc). it would be nice to get the accurate count of hosts sending data to the indexer.   thanks, Eholz`
Hello Splunkers, I have a field called state_sinfo which have values like (up,up*,up$,up^,continue,continue$,continued,continied$,down,down%,down#,drop,drop*,drop$) I want to categorize certain v... See more...
Hello Splunkers, I have a field called state_sinfo which have values like (up,up*,up$,up^,continue,continue$,continued,continied$,down,down%,down#,drop,drop*,drop$) I want to categorize certain values of state_sinfo as like below available (up,up*,up$,up^,continue,continue$,continued,continied$) not_available(down,down%,down#) down(drop,drop*,drop$) Then I want to calculate the sum  of all categories by time Lastly I want to calculate the  percentage  | eval "% available" = round( available / ( available + drop ) * 100 , 2) | eval "% drained" = round( drop / (available + drop ) * 100 , 2) Sample event   slu_ne_state{instance="192.1x.x.x.",job="exporters",node="xyz",partition="gryr",state_sinfo="down",state_sinfo_simple="maint"} 1.000000 1676402381347 Thanks In advance 
We upgraded our Splunk Enterprise from v8.2.5 to v9.0.1.  When we did, it broke the Add-on for Microsoft 365. Every time a connection is made to microsoft we see this SSL error: SSLError(SSLCertVer... See more...
We upgraded our Splunk Enterprise from v8.2.5 to v9.0.1.  When we did, it broke the Add-on for Microsoft 365. Every time a connection is made to microsoft we see this SSL error: SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self signed certificate in certificate chain (_ssl.c:1106)'))) Has anyone run into this before?    
Hello, I'm a new Splunk Compliance Manager and I need some assistance. How do i check Splunk Compliance and how do i better manage licensing?   Thanks, Rodney
Hi, i do know that you simply can add a html part above the charts to replace the actual panel title and that class used in the html part is easily centered. However it is not as wide as the chart ... See more...
Hi, i do know that you simply can add a html part above the charts to replace the actual panel title and that class used in the html part is easily centered. However it is not as wide as the chart below. You also can use css to change the style of the panel title itself, but fpr some reason it has a weird offset and is not truly centered. The same is true for chart titles... Back in a project i found a way to use flexbox to truly center the native .panel-title style But for the hell of me, i can not put it back together. The problem is that the flexbox itself is already not centered in the panel header. Any ideas are greatly appreciated.   Kind regards, Mike
I have a lookup which I want to compare search results against and find duplicate values.   How do I ignore duplicates found that already exist in my dataset? And only identify duplicates using resul... See more...
I have a lookup which I want to compare search results against and find duplicate values.   How do I ignore duplicates found that already exist in my dataset? And only identify duplicates using results from my search compared to the dataset? index=myindex sourcetype=k_logs (ns4:phoneNo OR emailInfo OR address) AND DummyOrgName AND "<requestType>UPDATEUSER</requestType>" | xmlkv | rename "ns4:phoneNo" as phoneNo | search orgName = "DummyOrgName" | eval phoneAndEmail= coalesce(phoneNo, address) | fields phoneAndEmailphoneNo address ipAddress userName | table phoneAndEmailphoneNo address ipAddress userName | append [|inputlookup thisLookup.csv | table phoneAndEmail phoneNo address ipAddress userName] | stats values(phoneNo) AS phoneNo values(address) AS address values(ipAddress) AS ipAddress values(userName) AS userName dc(userName) AS UserCount by phoneAndEmail | where UserCount>2
I need to provide audit details on our ES Content Library. Using rest, I can identify searches that have been updated and when they were updated, but the rest call only reports on the owner of the se... See more...
I need to provide audit details on our ES Content Library. Using rest, I can identify searches that have been updated and when they were updated, but the rest call only reports on the owner of the search, not the person who made the change. | rest splunk_server=local /servicesNS/-/-/saved/searches | fields title search eai:acl.owner eai:acl.app alert_type updated cron_schedule auto_summarize.suspend_period dispatch.earliest_time dispatch.latest_time id | convert timeformat="%Y-%m-%dT%H:%M:%S+00:00" mktime(updated) | where updated >= relative_time(now(), "-4h") Looking at conf.log I can see when a search was written: index="_internal" source="/opt/splunk/var/log/splunk/conf.log" earliest=-30h WRITE_STANZA | stats values(data.optype_desc) values(data.payload.children.action.correlationsearch.label.value) values(data.payload.children.search.value) Neither of these searches tell me who was the individual writing the search. Any other ideas as to how I can accomplish this? Thank you.
I have a dataset which has a column "Port" that contains (limited) numerical values.  I want to make these values display as text (e.g. 443 == HTTPS).  I could do this in Excel but I'm a Splunk newbi... See more...
I have a dataset which has a column "Port" that contains (limited) numerical values.  I want to make these values display as text (e.g. 443 == HTTPS).  I could do this in Excel but I'm a Splunk newbie and frankly in need of a nudge in the right direction....I assume it would be some kind of lookup? I would then pull the text values into a pivot for a dashboard to replace my current one with the port numbers. Kudos and virtual shiny things for anyone who can help