All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Can someone help with query? I have 2 index abc and bcz From abc index I want to show stats for field1 where field2 from index abc matches with field3 of index bcz and bcz index field5="value" ... See more...
Can someone help with query? I have 2 index abc and bcz From abc index I want to show stats for field1 where field2 from index abc matches with field3 of index bcz and bcz index field5="value"   what I tried which is not working:  index=abc | stats count by field1 | join type=inner field2 [search index=bcz  | rename field3 as field2 | where field5="employee_name"]
We need to configure which dashboards is a user allowed to navigate through Splunk Mobile, but this user is shown all the dashboards he has access to instead of the admin selected ones. According to... See more...
We need to configure which dashboards is a user allowed to navigate through Splunk Mobile, but this user is shown all the dashboards he has access to instead of the admin selected ones. According to the documentation (https://docs.splunk.com/Documentation/SecureGateway/3.3.0/Admin/AppSelection) admins can choose which apps to show dashboards from in the Connected Experiences mobile apps. This configuration is global. Dashboards from the apps you choose show for all devices registered to the Splunk platform instance with this configuration. This is not what we are experiencing, the admin selects a few dashboards from a single app to show (just this ones, the rest are hidden), but the user still sees all the dashboards he is allowed through RBAC.
< query > ... | stats count by return_code fetches me the below output. I have to create an alert where the sum of any return_code value other than 100 and 200 should not cross 20% of the ... See more...
< query > ... | stats count by return_code fetches me the below output. I have to create an alert where the sum of any return_code value other than 100 and 200 should not cross 20% of the overall value. Example: from the above image, I will add the count of return_codes (other than 100 and 200 ) which will result as 226. now the count of 100 and 200 is 2924. now the  percentage will come around 7.17 %. How do I achieve this via query?
Hi, I have an ITSI issue, it was working correctly and suddenly I have N/A, no events and no data in my ITSI module.  I have checked all splunkd.log and ITSI log and conf files without success. ... See more...
Hi, I have an ITSI issue, it was working correctly and suddenly I have N/A, no events and no data in my ITSI module.  I have checked all splunkd.log and ITSI log and conf files without success. Could you give me a hint ? Regards      
In the below search I am looking for rules hit by count, but how or where would I add a NOT or !, if I wanted to know what rules have not be hit. index=pan_logs | fields _time, rule | stats count b... See more...
In the below search I am looking for rules hit by count, but how or where would I add a NOT or !, if I wanted to know what rules have not be hit. index=pan_logs | fields _time, rule | stats count by rule | sort -count
Hi community, I've just performed an upgrade on my infrastructure (distributed environment) from Splunk 8.2.3 to Splunk 9.0.3. All the instances seem to work fine, I have problems though in apply... See more...
Hi community, I've just performed an upgrade on my infrastructure (distributed environment) from Splunk 8.2.3 to Splunk 9.0.3. All the instances seem to work fine, I have problems though in applying search head cluster bundle. I use this command to upgrade Splunk Enterprise Security:   $SPLUNK_HOME/bin/splunk apply shcluster-bundle -preserve-lookups true -target https://instance1:8089     But it doesn't work and I receive this message:   Error while deploying apps to first member, aborting apps deployment to all members: Error while updating app=SplunkEnterpriseSecuritySuite on target=https://instance1:8089: Error in JSON response: Unexpected EOF     Do you have any idea of what could be the problem?   Thank you Marta
Hi All, Can anyone help me with splunk command to know how much disk space utilized by UF and what is using that much space ? Regards, PNV
I display licensing in a dashboard using the licensing search for Previous 60 Days split by index. This shows a line with my license, all days, and stacked indexes. It works on classic dashboards, bu... See more...
I display licensing in a dashboard using the licensing search for Previous 60 Days split by index. This shows a line with my license, all days, and stacked indexes. It works on classic dashboards, but in the new Dashboard Studio it doesn't work correctly and I don't see column settings for interval, etc. in Studio. Is there another way to display this using Studio? Or am I missing some settings?
|eval TotalApps=if(match('Total',"NTB"),"1","0") |eval In-Progress=if('Total'="NTB" AND isnull('APPL_SUB-DATE'),"1","0") |eval Submitted=if('Total'="NTB" AND isnotnull('APPL_SUB-DATE'),"1","0") ... See more...
|eval TotalApps=if(match('Total',"NTB"),"1","0") |eval In-Progress=if('Total'="NTB" AND isnull('APPL_SUB-DATE'),"1","0") |eval Submitted=if('Total'="NTB" AND isnotnull('APPL_SUB-DATE'),"1","0") |eval My-InfoUsed=if('Total'="NTB" AND isnotnull('APPL_SUB-DATE') AND isnotnull('MY-INF0-CONCUR-FLAG'),"1","0") |stats sum(TotalApps) as "Total Apps" sum(In-Progress) as "In Progress" sum(Submitted) as "Apps Submitted" sum(My-InfoUsed) as "My InfoUsed" by Mon-Year |transpose Column_name="Category" getting results as Category        row1 Mon-Year                Jan-2023 Total Apps                06 In Progress              06 Apps Submitted      0 My InfoUsed              0 But requirement is , Mon-Year        Category               Total Jan-2023         TotalApps              06                               In Progress            06                               Apps Submitted    0                               My InfoUsed             0
Hello, which method is best, using TIME_PREFIX = timestamp":" or TIMESTAMP_FIELDS = @timestamp? https://docs.splunk.com/Documentation/Splunk/8.2.2/Data/Configuretimestamprecognition#Examples does... See more...
Hello, which method is best, using TIME_PREFIX = timestamp":" or TIMESTAMP_FIELDS = @timestamp? https://docs.splunk.com/Documentation/Splunk/8.2.2/Data/Configuretimestamprecognition#Examples does not talk about TIMESTAMP_FIELDS We are using this parameter for another JSON source and it works fine too.       Examples : UF side : etc/deployment-apps/_server_app_LBA_ZZZ_LX/local/props.conf [ZZZ_metrics_json] TIMESTAMP_FIELDS = start (useless in my opinion as should only run on indexers side?) TIME_FORMAT = %Y-%m-%dT%H:%M:%S.%3N.%z (useless in my opinion as should only run on indexers side?) INDEXED_EXTRACTIONS = json etc/deployment-apps/_server_app_LBA_MIC_SUP/local/props.conf [VVV:sup:json] INDEXED_EXTRACTIONS = json IDXC side : [siem@s301lbasplmgt2 ~]$ cat /OPT/siem/splunk/etc/master-apps/APP_PROPS/local/props.conf [ZZZ_metrics_json] TIMESTAMP_FIELDS = start TIME_FORMAT = %Y-%m-%dT%H:%M:%S.%3N.%z etc/master-apps/XXX_VVV_PROPS/default/props.conf [VVV:sup:json] TIME_FORMAT = %Y-%m-%dT%H:%M:%S.%3N.%z TIME_PREFIX = timestamp":" MAX_TIMESTAMP_LOOKAHEAD = 50 SHC side: etc/shcluster/apps/XXX_VVV_PROPS/default/props.conf [VVV:sup:json] KV_MODE = none etc/shcluster/apps/APP_YYY_parser_json/default/props.conf [ZZZ_metrics_json] KV_MODE = none       Thanks for your help.  
Hello Community, I would like to inquire about some issues I am facing while setting up a heavy forwarder in splunk. Please take a look at the below issues :-  1) Hosts are visible in splunk but al... See more...
Hello Community, I would like to inquire about some issues I am facing while setting up a heavy forwarder in splunk. Please take a look at the below issues :-  1) Hosts are visible in splunk but all of them are not forwarding their logs to the indexer. 2) Linux server are not able to forward logs to the indexer. 3) Some host are able to forward their logs to indexer post a modification in their universal forwarder file manually, but it takes an hour or so before they forward their logs. 4) The most recently added do not show their logs in real time i.e. when a time frame recently added devices should logs in last 4 hours or 60 minutes but they do show only post 24 hours time filter.   Thanks in advance.
Hello everyone,  I have logs like      2022-11-23 12:47:42.000 id="123" event="some text text2 text3 text4"     I want to trim everything that goes after three consecutive spaces, so ... See more...
Hello everyone,  I have logs like      2022-11-23 12:47:42.000 id="123" event="some text text2 text3 text4"     I want to trim everything that goes after three consecutive spaces, so I want to get raw logs     2022-11-23 12:47:42.000 id="123" event="some text text2 text3"       I did such props.conf [my_sourcetype] ... EXTRACT-event = event="(?<event>.+?)\s{3,}.*" ...   It's working fine, I get event field what I want, but I still get old logs with 3+ spaces. What should I add to props conf to get correct logs?
How can i create notable events alert if any of correlation searches is getting skipped?
Dear All, Can you please suggest whether any index creation (though cli) is required to configure/Onboard new API in to Heavy forwarder .   APP Name :Cisco Umbrella Add-On for Splunk  
I want to monitor my all hosts, esxi's, etc in my vCenter environment. I am working in a distributed environment and I want to send all alarms (for errors) and all data that can help me to ensure tha... See more...
I want to monitor my all hosts, esxi's, etc in my vCenter environment. I am working in a distributed environment and I want to send all alarms (for errors) and all data that can help me to ensure that the health of my vcenter environment is good. Can someone please help and send me the steps in order to do that? It will be helpful to also add tutorials or  documentation for each part. (I don't know for example in what component to enable the HEC token or how to use API to send the alarms from vCenter to my Splunk)
I have six eventtype's that each check Juniper router logs for an Interface bounce (an up/down event). These are working good. Here is an example, the other five are just variations of this (differen... See more...
I have six eventtype's that each check Juniper router logs for an Interface bounce (an up/down event). These are working good. Here is an example, the other five are just variations of this (different routers and interfaces): sourcetype="syslog" host_rdns="lo0.router1.domain.com" AND SNMP AND "xe-0/0/1" NOT "0/3/1.*" I am doing the following search during business hours (08:00 to 20:30/7days a week) as a timechart that spans one day, and displays each eventtype as the "office#" site name with how many flaps per hour occurred during the business hours: sourcetype="syslog" (eventtype="office1" OR eventtype="office2" OR eventtype="office3" OR eventtype="office4" OR eventtype="office5" OR eventtype="office6") NOT UI_CMDLINE | eval date_hourmin=strftime(_time, "%H%M") | eval date_numday = strftime(_time, "%w") | eval date_dow=strftime(_time, "%A") | eval full_datew = _time." ".date_dow| eval mytime=strftime(_time, "%Y-%m-%d, %A") | search (date_hourmin>=0800 date_hourmin<=2030 AND date_numday>=0 date_numday<=6) | timechart span=1d count as "Interface Flap" by eventtype | eval time=strftime(_time, "%m/%d/%Y, %A") | fields - _time | rename office1 as "Home Office", office2 as "Seattle", office3 as "Portland", office4 as "Dallas", office5 as "Chicago", office6 as "New York", time as "Day, Date"   This is working as I want and expect it to, like so: But I cannot figure out how to display all six eventtype's (sites) at all times, including the eventtype's with ZERO counts. I've tried everything I can think of - fillnull, adding fake results (maybe I am doing that wrong?) but I cannot figure out what I am missing/doing wrong. Can someone provide pointers for the best way to address this issue?
Hi Team,   i want store the query results in lookup file  , but outputlookup  command is not updating the csv as per results set .   index = ........ queryresults ............|  outputlookup ... See more...
Hi Team,   i want store the query results in lookup file  , but outputlookup  command is not updating the csv as per results set .   index = ........ queryresults ............|  outputlookup test.csv    is there any changes required  in the query ?     regards, supraja  
Hi, Could you provide me with the search query for one of my index es_splunk ,so that we can find all the null fields, regex case sensitive so it's only catching "null", all lower case, but they ma... See more...
Hi, Could you provide me with the search query for one of my index es_splunk ,so that we can find all the null fields, regex case sensitive so it's only catching "null", all lower case, but they may ALL be that way anyway. Just mentioning for completeness... as well as there could be fields that are not "null" but simply an empty string. Those two cases should be checked if we want 100% coverage.   Thanks.    
Hello Everyone, I need your help please I am using the Location Tracker to follow some alerts. My spl request is : index="imcfault" sourcetype="st_imcfault" | lookup switchs.csv ip AS source... See more...
Hello Everyone, I need your help please I am using the Location Tracker to follow some alerts. My spl request is : index="imcfault" sourcetype="st_imcfault" | lookup switchs.csv ip AS sourceIp | rex field=location "^(?<latitude>.+?), (?<longitude>.+?)$" | table _time latitude longitude faultDesc The lookup switchs.csv returns the following elements : adresse ip label location The final result of the request is :   I want to have the static Icon in two colors : Orange : severity between 0 and 2 red : severity between  3 and 4 Thank you so much
Hello everyone, I have such fields in log: event="some text text2 text3   something     something2", how should I make regex formula to match all until 3 or more spaces? for example, for this even... See more...
Hello everyone, I have such fields in log: event="some text text2 text3   something     something2", how should I make regex formula to match all until 3 or more spaces? for example, for this event it should match "some text text2 text3"