All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hey people, my requirement is as such   I have extracted these columns from my data using the query  my query | rex "filterExecutionTime=(?<FET>[^,]+)" | rex "ddbWriteExecutionTime=(?<ddbET>[^... See more...
Hey people, my requirement is as such   I have extracted these columns from my data using the query  my query | rex "filterExecutionTime=(?<FET>[^,]+)" | rex "ddbWriteExecutionTime=(?<ddbET>[^)]+)" | rex "EXECUTION_TIME : (?<totalTime>[^ ms]+)" | eval buildAndTearDowTime=(tonumber(FET)) + (tonumber(ddbET)) |table totalTime FET ddbET buildAndTearDownTime     I want to have buildAndTearDown as totalTime - (FET+ ddbET)   once I have all the three values required (FET, ddbET, buildAndTearDown) I want to put these values in a pie chart.   Another question I have is why is  This statement  eval buildAndTearDowTime=(tonumber(FET)) + (tonumber(ddbET)) is giving me null value   Thanks   
    index=servicenow assignment_group_name="security" status=* | stats count by number,status,group_name,created_on     The above query will produce the following: I need to calculate t... See more...
    index=servicenow assignment_group_name="security" status=* | stats count by number,status,group_name,created_on     The above query will produce the following: I need to calculate the number days from the "created on" date shown above in the example to the current date.   Any help with this is greatly appreciated.
/var/log VS /var/log/messages /var/log/auth.log /var/log/boot.log etc, etc, etc
I have this errors in my search, can you help me?   Unexpected status for to fetch REST endpoint uri=https://127.0.0.1:8089/services/licenser/licenses?count=0 from server=https://127.0.0.1:8089 -... See more...
I have this errors in my search, can you help me?   Unexpected status for to fetch REST endpoint uri=https://127.0.0.1:8089/services/licenser/licenses?count=0 from server=https://127.0.0.1:8089 - Forbidden   Failed to fetch REST endpoint uri=https://127.0.0.1:8089/services/licenser/licenses?count=0 from server https://127.0.0.1:8089. Check that the URI path provided exists in the REST API The REST request on the endpoint URI /services/licenser/licenses?count=0 returned HTTP 'status not OK': code=403, Forbidden.  
Hello, I'm hosting a Splunk Enterprise free trial on an AWS instance.  I'd like to share this with some friends to practice with some Boss of Soc Data. How many people can access it the Splunk Enter... See more...
Hello, I'm hosting a Splunk Enterprise free trial on an AWS instance.  I'd like to share this with some friends to practice with some Boss of Soc Data. How many people can access it the Splunk Enterprise free trail at one time?
I'm hoping to get some help or direction. I have seen a few different forum posts where the search pulled how many concurrent sessions were happening at a time. (General count of sessions occurring a... See more...
I'm hoping to get some help or direction. I have seen a few different forum posts where the search pulled how many concurrent sessions were happening at a time. (General count of sessions occurring at a given time) I somewhat get that done with this search: index=main EventCode=4624  | eval Account=mvindex(Account_Name,1) | eventstats dc(host) AS Logins by Account | where Logins > 1 | timechart count(Logins) BY Account I am hoping to pivot into a search with more detail such as Account login session duration and any overlap in sessions from unique hosts. The goal is to pinpoint potentially shared credentials for further investigation. I have played with transaction a bit, but can't seem to get it to work the way I need and have read many posts advising against this command due to resource usage.  Any tips for a Splunk Newb?
We just upgraded Splunk DB Connect from 3.9.0 to 3.11.0 on our Splunk Enterprise 9.0.3  Heavy Forwarder and getting warning "DBX cannot connect to task server" Port 9998 is free , nobody is listen... See more...
We just upgraded Splunk DB Connect from 3.9.0 to 3.11.0 on our Splunk Enterprise 9.0.3  Heavy Forwarder and getting warning "DBX cannot connect to task server" Port 9998 is free , nobody is listening on it . We have updated Java 8 to Java 11 just now. Rolling DB Connect back to 3.0.9 fixes the issue, DB Connect starts working again. Will appreciate any advice. Thank you!
Hello, I'm wondering if there is a possibility that it can be extracted with a variable for a mail form since the client wants to see the disk health rule in which the problem is found Thanks in adv... See more...
Hello, I'm wondering if there is a possibility that it can be extracted with a variable for a mail form since the client wants to see the disk health rule in which the problem is found Thanks in advance
  I want to run this search but i have to concatenate the string with a variable and it doesn't work        | rest splunk_server=local /servicesNS/-/-/saved/searches      | where match(search,"ou... See more...
  I want to run this search but i have to concatenate the string with a variable and it doesn't work        | rest splunk_server=local /servicesNS/-/-/saved/searches      | where match(search,"outputlookup\s.$lookup$") 
Hi, Not sure what the issue is. I got the solution from the other answers, but it's not working for me. I am getting data from splunk date picker and trying to calculate the number of days.  |addin... See more...
Hi, Not sure what the issue is. I got the solution from the other answers, but it's not working for me. I am getting data from splunk date picker and trying to calculate the number of days.  |addinfo | eval min=info_min_time, max=info_max_time | eval earliest =strftime(min,"%Y-%m-%d %H:%M:%S") | eval latest=strftime(max,"%Y-%m-%d %H:%M:%S") | eval duration = round((latest-earliest)/86400) |table latest, earliest, duration   Thanks
From here i need to extarct the identification=MLAS, MLA, LAS and VAM My sample logs: [12/12/21] 12:10:112 GMT] I6789HIOO applicattion authenticationid=100| |35467577889999| |67775-ghhgfrt-6788h-76... See more...
From here i need to extarct the identification=MLAS, MLA, LAS and VAM My sample logs: [12/12/21] 12:10:112 GMT] I6789HIOO applicattion authenticationid=100| |35467577889999| |67775-ghhgfrt-6788h-7667788; clientid="7689-jhgg-8765r-kkjggt"; app=" "; QueryLetter="yard=MS&identification=MLAS&timeRange=EVERYDAY&timePeriod=MINUTES [12/12/21] 12:10:112 GMT] I6789HIOO applicattion authenticationid=100| |35467577889999| |67775-ghhgfrt-6788h-7667788; clientid="7689-jhgg-8765r-kkjggt"; app=" "; QueryLetter="yard=MS&identification=MLA&timeRange=EVERYDAY&timePeriod=MINUTES [12/12/21] 12:10:112 GMT] I6789HIOO applicattion authenticationid=100| |35467577889999| |67775-ghhgfrt-6788h-7667788; clientid="7689-jhgg-8765r-kkjggt"; app=" "; QueryLetter="yard=MS&identification=LAS&timeRange=EVERYDAY&timePeriod=MINUTES [12/12/21] 12:10:112 GMT] I6789HIOO applicattion authenticationid=100| |35467577889999| |67775-ghhgfrt-6788h-7667788; clientid="7689-jhgg-8765r-kkjggt"; app=" "; QueryLetter="yard=MS&identification=VAM&timeRange=EVERYDAY&timePeriod=MINUTES in my selected fileds or intresting fileds  indeentification fileds  should appear has below: MLAS MLA LAS  VAM
So what happened to parsetest? $ splunk cmd parsetest couldn't run "/opt/splunk/bin/parsetest": No such file or directory $ splunk --version Splunk 9.0.1 (build 82c987350fde) $ splunk help cmd | g... See more...
So what happened to parsetest? $ splunk cmd parsetest couldn't run "/opt/splunk/bin/parsetest": No such file or directory $ splunk --version Splunk 9.0.1 (build 82c987350fde) $ splunk help cmd | grep parsetest parsetest Validates parsing rules for a single event. Still documented in latest docs https://docs.splunk.com/Documentation/Splunk/9.0.3/Troubleshooting/CommandlinetoolsforusewithSupport#parsetest Looking through the manifest of older Splunk versions and parsetest is not found since splunk-7.1.9-45b25e1f9be3. I would like it back
Hello! I have many events, and I have a search that returns only the events that contain the to field.     index="my_index_qa" sourcetype="example-qa" to=*       The results are a l... See more...
Hello! I have many events, and I have a search that returns only the events that contain the to field.     index="my_index_qa" sourcetype="example-qa" to=*       The results are a list of events that have the following pattern:     db271cf8678c -2023-01-12 15:08:32.157 [app=app-name, traceId=traceid-value, spanId=spanid-value, INFO 1 [llEventLoop-5-5] filter.FilterBeingUsed : c=class, m=method, method=GET, to=http://example.url.com/path/extra, route=https://example.url.com/redirect/route, headers={X-Forwarded-For=[IPADDRESS, IPADDRESS2], X-Forwarded-Proto=[http], X-Forwarded-Port=[80], Host=[EXAMPLE-HOST], app-device=[DEVICE-INFO], app-user=[devicce-info-os-info], app-os=[APP-OS-VERSION], user-agent=[user-agent-example], app-version=[app.version.example], Origin=[origin-app]}       I want to be able to group by the to= values, so I can count the number of times they repeat, create charts and do some other metrics. Is it possible? How can I do this? Thank you for any help in advance. And sorry if I wrote anything wrong, english is not my main language.  
Hello Good people, I am pretty new to the splunk community. I have inherited a splunk enterprise application. The Splunk server on weekdays is being forwarded around 45GB of data, daily, mon-fri. On... See more...
Hello Good people, I am pretty new to the splunk community. I have inherited a splunk enterprise application. The Splunk server on weekdays is being forwarded around 45GB of data, daily, mon-fri. On the weekends it increases to 80GB per day, which seems to be odd since no one is on the network on the weekends. Where would I begin to look at configuration files in order to decrease the amount of data being sent? Also, our license limit is only 15GB.
Hello All, I have following lines in the log file -   Server8 runiyal 2023-01-12 09:48:41,880 INFO Plugin.DOCUMENT Bytes size from input stream : 2072823 server8 runiyal 2023-01-12 09:48:41,978... See more...
Hello All, I have following lines in the log file -   Server8 runiyal 2023-01-12 09:48:41,880 INFO Plugin.DOCUMENT Bytes size from input stream : 2072823 server8 runiyal 2023-01-12 09:48:41,978 INFO Plugin.DOCUMENT File size after upload to temp folder: 2072823 server8 runiyal 2023-01-12 09:48:43,391 SUCCESS Plugin.DOCUMENT File size after notifying the docrepo : 2072823   I want to - 1. Search for the DocID in the end <2072823>; It should have SUCCESS written in line. (Line3) 2. It should then look at the above line with string "from input stream" for the same DocID (Line 1) 3. Reduce the timestamp from SUCCESS line (3) to the timestamp in line with the text "from input stream" (Line 1) - Result will be in seconds 4. Result should be in two columns: "DocID" and "Time Taken" (4) Will appreciate your inputs on how this can be achieved. Thanks!
so I am trying to do something super simple having watched a basic YouTube video on how to do it, I just want to add a new menu item to the top navigation bar, something like "Test" In the Web UI I... See more...
so I am trying to do something super simple having watched a basic YouTube video on how to do it, I just want to add a new menu item to the top navigation bar, something like "Test" In the Web UI I go to Settings \ User interface \ Navigation menus and then click on the default Nav name in the list of my custom app for example   <nav search_view="search"> <view name="ess_home" default="true" /> <view name="ess_security_posture" /> <view name="incident_review" /> <view name="ess_investigation_list" /> <view name="my_new_test_item" /> </nav>   I save it and get the Successfully updated "default" in SplunkEnterpriseSecuritySuite. confirmation but nothing happens, I never see my new item up top   
We are trying to troubleshoot some memory consumption issues with one of the SH cluster nodes. We found that this instance shows high concurrency of scheduled reports 46/15 historical while the ot... See more...
We are trying to troubleshoot some memory consumption issues with one of the SH cluster nodes. We found that this instance shows high concurrency of scheduled reports 46/15 historical while the other nodes are way below this number. Also in the running historical scheduled reports panel we got a column Mode that shows "historical" as value. What does a "historical" report mean in this context? The Splunk documentation for DMC doesnt explain it. https://docs.splunk.com/Documentation/Splunk/9.0.3/DMC/Scheduleractivity Regards.
Hi all, I'm currently using Splunk Cloud and my focus is to display status icons as values based on the search results in my classic dashboard table. I found a way to display only the icon with html... See more...
Hi all, I'm currently using Splunk Cloud and my focus is to display status icons as values based on the search results in my classic dashboard table. I found a way to display only the icon with html but at the same time im struggling to assign the icon based on the result from the search query (if result active, pass icon check-circle else default pass icon warning/error etc.). How can I achieve this ? Any tweaks from this code attached will be much appreciated! <row> <html> <div> <td class="icon-inline numeric"> <i>Range icon: </i> <i class="icon-check-circle" style="color: green"><var>low</var></i> <i class="icon-alert" style="color: orange">warning</i> <i class="icon-alert-circle" style="color: red">error</i> </td> </div> </html> </row> <row> <panel> <table id="t1"> <search> <query>index=XXX host=* | eval host=upper(host) | stats count BY host | eval count=1, host=upper(host) | fields host count | stats sum(count) AS total BY host|rangemap field=total low=1-10 default=severe</query> <earliest>-30m@m</earliest> <latest>now</latest> <sampleRatio>1</sampleRatio> </search> <option name="count">100</option> <option name="dataOverlayMode">none</option> <option name="drilldown">none</option> <option name="percentagesRow">false</option> <option name="rowNumbers">false</option> <option name="totalsRow">false</option> <option name="wrap">true</option> </table> </panel> </row>  
I have a search that outputs a table like below            user  |  host  |  app -------------------------------------         user1 | host1 | app1   I want to add a new field that that finds t... See more...
I have a search that outputs a table like below            user  |  host  |  app -------------------------------------         user1 | host1 | app1   I want to add a new field that that finds the Department of the user from another search. So it would look like this         dep  |  user  |  host  |  app -------------------------------------     dep1 |  user1 | host1 | app1     The second search will have something like this in it so i don't think a join would be sufficient    where match(search,"something\s+user")  
Hi, How to remove the null field values from the  Palo cortex data lake stream logs to reduce the splunk volume ingestion..   Thanks