All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Is there any chance that someone will update the BlueCat Add-On for Splunk for DHCP logs? When I review the TA, the props/transforms are not aligning with the DHCP log format anymore. Thx
Hi All, I'm pretty new to Splunk so forgive me if this is an easy question. I'm trying to figure out how to a) search for an event and then b) search for different events that happened before/aft... See more...
Hi All, I'm pretty new to Splunk so forgive me if this is an easy question. I'm trying to figure out how to a) search for an event and then b) search for different events that happened before/after the event. For example, I want to search failed logins for a certain account, and then try to find other login events for that host 5 mins before and after. I can figure out how to search for the events individually, but don't know how to combine them and then format them into something like a table. So my first search would be: index="wineventlog" EventCode=4768 Result_Code=0x6 And the second search would be based on the first search, but for a different event code: search index="wineventlog" EventCode=4624 | "filter by the results of the first search 5 mins before/after each event" Eventually I'd want to get to a table similar to this: Time                                  Event                                  Supporting Events Jan 18 @ 10:01am    Event 1                               Jan 18 @ 10:03am              Event 1a                                                                                          Jan 18 @ 10:02am              Event 1b Jan 17 @ 7:33am       Event 2                              Jan 17 @ 7:35am                 Event 2a                                                                                         Jan 17 @ 7:32am                 Event 2b ect...etc... Thanks!
Hi, I am very new to splunk and need help for the below situation. I am having two columns as below Row        Column 1                                  Column2 1.        Value:dataclass         ... See more...
Hi, I am very new to splunk and need help for the below situation. I am having two columns as below Row        Column 1                                  Column2 1.        Value:dataclass                      Internal               Value:url                                     http://****.com/****               Value:application-name      ABC               Value:daily-backup                Y 2.        Value:dataclass                      Internal               Value:url                                     http://*n**.com/****               Value:application-name      XPZ               Value:daily-backup                N Now I need to convert these row value of Column1 as Column and Column 2 value as their row value like below. Dataclass                    URL                            Application-Name                                   Daily-Backup Internal               http://****.com/****                ABC                                                           Y Internal               http://*n**.com/****                XPZ                                                          N   Thanks in advance.    SVM
I have a report index IN (proxy) src_ip=* |eventstats sum(sbimb) as Totalsbimb, sum(sbomb) as Totalsbomb by src_ip | search (sbimb > 300) OR (sbomb > 20) OR (Totalsbimb > 500) OR (Totalsbomb > 10)... See more...
I have a report index IN (proxy) src_ip=* |eventstats sum(sbimb) as Totalsbimb, sum(sbomb) as Totalsbomb by src_ip | search (sbimb > 300) OR (sbomb > 20) OR (Totalsbimb > 500) OR (Totalsbomb > 10) | sort -sbomb Tried top but can only get one or the other and I need to pass dest,totalsbomb and totalsbimb with the top event.  I keep finding ways to get one but not the other. I am tring to get a table with src_ip, dest, sbimb(for dest) sbomb (for dest) totalsbomb and totalsbimb for src_ip .  query takes too long to run twice with append. 
I'm creating a dashboard that lets users input a comma delimited list of CVE's to search for.  I'm trying to display a table that shows the number of times each CVE was found.  I know how to display ... See more...
I'm creating a dashboard that lets users input a comma delimited list of CVE's to search for.  I'm trying to display a table that shows the number of times each CVE was found.  I know how to display the number if the CVE was in the data but I'm struggling to find out how to display 0 for CVE's that aren't in the data. I have a base query that uses tstats (since it runs against a data model) and I can run any additional SPL off the base query in the table panel.   The base query looks like this   <form> <label>Vulnerability Distribution</label> <init> <set token="tok_query">base</set> </init> <search> <query>| makeresults count=1 | eval Vulnerabilities.cve=if("$cves$"=="*",null(),split($cves|s$,",")) | format | eval search=if(search=="NOT ()","","AND ".search) </query> <done> <set token="tok_query">$result.search$</set> </done> </search> <search id="base"> <query> | tstats latest(Vulnerabilities.cve) as cves latest(Vulnerabilities.Vuln_Mgmt.vulnerability_name) as vulnerability_name max(Vulnerabilities.Vuln_Mgmt.age) as age `vm_datamodel_default_filter` $tok_query$ by Vulnerabilities.Vuln_Mgmt.dest_ip,Vulnerabilities.Vuln_Mgmt.vulnerability_id | rename Vulnerabilities.Vuln_Mgmt.* as * </query>       the vm_datamodel_default_filter macro just has our normal filters (i.e. WHERE severity > 3 AND status=open...) The panel query that shows the count for CVE's it found looks like this:       <panel> <title>Vulnerability Distribution</title> <table> <search base="base"> <query>| stats latest(cves) as cves dc(dest_ip) as vulnerable_assets by vulnerability_id</query> </search> </table> </panel>       I just can't figure out how to get the table to include 0 for CVE's not found. Any help would be greatly appreciated
Recently we needed to update the Client Secret for one of our tenants and I wanted to ask what is the most efficient way of tracking what the token expiry date is  and to create an alert in Splunk? ... See more...
Recently we needed to update the Client Secret for one of our tenants and I wanted to ask what is the most efficient way of tracking what the token expiry date is  and to create an alert in Splunk? I had a look at the logs and couldn`t find anything to indicate when the access token is about to expire.
Hello all, When splunk is set up in Azure, does Azure charge for the Alerts and notification or how does the alert charges works when splunk in set up in Azure.
Hi all, i am using a search using internal index but i want to add a field values which is in other index = wineventlog below is the i am using from internal index  in the search i want to add a f... See more...
Hi all, i am using a search using internal index but i want to add a field values which is in other index = wineventlog below is the i am using from internal index  in the search i want to add a field to table     
Hello Team, I need to send an alert on all working day at 8.00 AM with a time range of 24hrs except on Monday with a time range of 3 days. Will this be possible in our alert settings for the same S... See more...
Hello Team, I need to send an alert on all working day at 8.00 AM with a time range of 24hrs except on Monday with a time range of 3 days. Will this be possible in our alert settings for the same SPL query but different time range. OR should we add in SPL query ?  
I've been struggeling for a while and hopefully someone here can help me.  Need to figure out if a user have an active session based on session id and user name. Active session is defined as only... See more...
I've been struggeling for a while and hopefully someone here can help me.  Need to figure out if a user have an active session based on session id and user name. Active session is defined as only event 21 received OR event 25 received has newer timestamp than event 24 received. Not active session is defined if only event 21 AND event 24 is received OR event 24 received has newer timestamp than event 25 received. Search starts something like this: index=main source=events EventCode IN (21,24,25) | fields _time, User, EventCode, Session_ID, host Thanks in advance
Hi, Am new to splunk and will be needing assitance in the health status of splunk.How to debug the below errors in red.  
Hello, On a specific service, I want to define my workflow names based on url path in order to follow key business actions on a web app. My wish : Remove the domain name Use the 3 first seg... See more...
Hello, On a specific service, I want to define my workflow names based on url path in order to follow key business actions on a web app. My wish : Remove the domain name Use the 3 first segments of URL Path to use them as workflow name, for example : /api/v1/products /api/v1/partners /api/v1/users  And also I want to mask or replace all IDs on the URL with a regex pattern : Do you have an idea how to do that on splunk APM ?   Thank you. Regards Aurélien.  
    | rex field=_raw "measResults\W(?<avgCpuUtilization>\d{0,3})\s(?<maxCpuUtilization>\d{0,3})" | rex field=_raw "PLMN-PLMN\W\w+-\d\W\w\w\w-\d{0,3}.\d{0,3}.\d{0,3}.\d{0,3}@(?<RB_OR_LVS_DC>\w+-\w+)... See more...
    | rex field=_raw "measResults\W(?<avgCpuUtilization>\d{0,3})\s(?<maxCpuUtilization>\d{0,3})" | rex field=_raw "PLMN-PLMN\W\w+-\d\W\w\w\w-\d{0,3}.\d{0,3}.\d{0,3}.\d{0,3}@(?<RB_OR_LVS_DC>\w+-\w+)" | eventstats avg(avgCpuUtilization) as AvgCPU max(maxCpuUtilization) as MaxCPU count by UK_OR_USA_DC | stats count by month,RB_OR_LVS_DC,month_name,monthyear,AvgCPU,MaxCPU | table month_name,AvgCPU,MaxCPU,UK_OR_USA_DC       UK_OR_USA_DC contain 2 values UK_DC and USA_DC, i want to calculate avgCpuUtilization and maxCpuUtilization for both UK_DC and USA_DC. so their  will be having 4 values  avgCpuUtilization_UK_DC,  maxCpuUtilization_UK_DC,  avgCpuUtilization_USA_DC ,  maxCpuUtilization_USA_DC,  i am unable to fecth this , how i can combine avgCpuUtilization and maxCpuUtilization with UK_DC . request your help on this 
Hi, I tried creating a network diagram viz and the nodes do not stop moving and spin around each other. Obviously, it makes the dashboard impossible to use. When I disable physics or enable hierarc... See more...
Hi, I tried creating a network diagram viz and the nodes do not stop moving and spin around each other. Obviously, it makes the dashboard impossible to use. When I disable physics or enable hierarchy it stops moving, but loses the topology view that I need. What can be done?
I would like to be able to configure the Splunk Add-on for Sysmon to ingest logs from a file instead of the Windows Event Log directly. The default input.conf in the Splunk Add-on for Sysmon App cont... See more...
I would like to be able to configure the Splunk Add-on for Sysmon to ingest logs from a file instead of the Windows Event Log directly. The default input.conf in the Splunk Add-on for Sysmon App contains the following:  [WinEventLog://WEC-Sysmon] disabled = true renderXml = 1 source = XmlWinEventLog:Microsoft-Windows-Sysmon/Operational sourcetype = XmlWinEventLog:WEC-Sysmon host = WinEventLogForwardHost I tried to override the input like so: [monitor:///path/to/my_file/filename.log] disabled = false renderXml = 1 source = XmlWinEventLog:Microsoft-Windows-Sysmon/Operational sourcetype = XmlWinEventLog:WEC-Sysmon host = WinEventLogForwardHost Unfortunately, it doesn't work and no logs appear to be sent by the Heavy Forwarder to my Indexer. the file I am using contains Windows Logs in a standard Windows Event Log XML format (1 per line). I want to be CIM compliant with my Sysmon logs but I cannot use a WinEventLog:// input, I have to use a file input.
Hi , I want to change the date format from 7/30/2023 12:00:00 AM to 2023-07-30 I am using following command but seems no luck eval DesiredDate = strftime(strptime(DesiredDate,"%m/%d/%YT%H:%M:%... See more...
Hi , I want to change the date format from 7/30/2023 12:00:00 AM to 2023-07-30 I am using following command but seems no luck eval DesiredDate = strftime(strptime(DesiredDate,"%m/%d/%YT%H:%M:%S.%QZ"),"%m-%d-%Y")
Regarding Federated search: Is the only authentication option username and password? We use SSO on the remote search head (LDAP/Reverse Proxy) which would be preferable. Why do you need to expl... See more...
Regarding Federated search: Is the only authentication option username and password? We use SSO on the remote search head (LDAP/Reverse Proxy) which would be preferable. Why do you need to explicitly define each remote index on the FSH? Why don’t Splunk allow you to enable all indexes and save the effort of having the maintain the list
My data looks like the following  student_id browser_id guid datetime x_id 12_a Chrome_2 1122 1/9/23 14:45 788a 13_a Chrome_4 1213 1/12/23 19:13 33b ... See more...
My data looks like the following  student_id browser_id guid datetime x_id 12_a Chrome_2 1122 1/9/23 14:45 788a 13_a Chrome_4 1213 1/12/23 19:13 33b 14_a Chrome_3 1422 1/13/23 1:42 24c 15_b FireFox_1 1289 1/16/23 15:46  12d 12_a Chrome_2 1132 1/11/23 21:50 788a Ideally, we shouldn't have different guids given same student_id, browser_id and x_id. I am trying to find all those student_ids who violate this rule aka student_ids with same browser_id and x_id but different guid. So for the above, I'd like to see something like -        12_a Chrome_2 1122 1/9/23 14:45 788a 12_a Chrome_2 1132 1/11/23 21:50 788a       I am trying -        index="main_idx" app="student_svc" | stats count by student_id browser_id guid datetime x_id | where count > 1 | stats list(count) by student_id       But it doesn't seem to be yielding the result. What should be the fix? Thanks
Hi, I am trying to use this Splunk Add-on for Microsoft Cloud Services on Splunk Enterprise platform. I have followed all the steps mentioned in the splunk doc Configure a Storage Account in Micr... See more...
Hi, I am trying to use this Splunk Add-on for Microsoft Cloud Services on Splunk Enterprise platform. I have followed all the steps mentioned in the splunk doc Configure a Storage Account in Microsoft Cloud Services - Splunk Documentation But Data is not getting indexed in Splunk unless i select the highlighted one in below pic in the Azure storage account  Due to company policy i cannot set it to "Enabled from all networks". I have tried raising microsoft support request but didnt get the solution. I am able to fetch the data from the storage account directly into Virtual Machine using azcopy command but using add on i am not able to index/fetch the data into splunk. Any help on troubleshooting this issue will be of great help
I need a link to download the latest HP-UX Splunk universal forwarder