All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi hello, I am getting data with destitantion country and based on that I need to show country flag in dashboard. I can upload images of flags to appserver/static, but I was thinking if there is ... See more...
Hi hello, I am getting data with destitantion country and based on that I need to show country flag in dashboard. I can upload images of flags to appserver/static, but I was thinking if there is any other solution? Does Splunk provide som database of flags? What would be the best approach? Thank you
Hello, Appdynamics agents cannot be exported. There are many similar topics in the forum. However, there were no definitive answers in my opinion. I'm not a programmer. That's why I'm sharing the... See more...
Hello, Appdynamics agents cannot be exported. There are many similar topics in the forum. However, there were no definitive answers in my opinion. I'm not a programmer. That's why I'm sharing the script I prepared for those who need ready-made codes like me. For non-programmers like me, I think it will be useful for most people if such sample codes are shared. It may be under a separate title, but I think it would be really good for everyone and appdynamics teams to share powershell, python, api query examples. (Life gets better when shared ) sorry but moderator friends are just giving directions. For those who don't know software like me please I ask developers and script writers to share more scripts and software code. import pandas as pd import requests import urllib3 urllib3.disable_warnings() from requests.auth import HTTPBasicAuth auth = HTTPBasicAuth('yourusername@customer1', 'yourpasswd') app_url='https://yourapmurl/controller/rest/applications?output=json' app_resp=requests.get(app_url , verify=False, auth=auth).json() dfs=list() for item in app_resp: name,node_id=item['name'],item['id'] node_url=f'https://yourappmurl/controller/rest/applications/{node_id}/nodes?output=json' response=requests.get(node_url , verify=False, auth=auth).json() df=pd.DataFrame(response) if len(df)>0: df=df[['machineName','tierName','appAgentVersion']] df['name']=name df['node_id']=node_id else: print(node_id) dfs.append(df) result=pd.concat(dfs).reset_index(drop=True) save_dir=r'export_your_path' result.to_excel(f'{save_dir}\\yourdata.xlsx',index=False)
Hi, I was just wondering what level of access is required to view other users private PDF schedules? And how these can then be made visible, with the correct level of access? Thanks, Rob.
I am calculating a health rate for projects based on specific criteria, generaly its the SUM of projects ranked A or B divided by the total number of projects.   I am trying to display a timechart of... See more...
I am calculating a health rate for projects based on specific criteria, generaly its the SUM of projects ranked A or B divided by the total number of projects.   I am trying to display a timechart of the Health Score as a function of time but with no luck. Here is my search:     basesearch | streamstats values(pipelineRun{}) as pipelines dc(pipelineRun{}) as num_pipelines by fullPath | spath path=project.Findings output=Findings | mvexpand Findings | spath input=Findings | eval ProjectRank=mvappend(ProjectRank, case(A>0 OR B>9, "F", A=1 OR (B<9 AND B>2) , "B", A=0 AND B=0, "A")) | eval PipelinesRank=mvappend(PipelinesRank, if(num_pipelines>8, "A", "F")) | eval ProjectFinalRank=mvappend(ProjectFinalRank, case(ProjectRank="F" OR PipelinesRank="F", "F", PipelinesRank="A" AND ProjectRank="B", "B", PipelinesRank="A" AND ProjectRank="A", "A")) | stats count by group ProjectFinalRank | stats sum(eval(if(ProjectFinalRank="A" OR ProjectFinalRank="B",count,0))) AS HIGH sum(count) AS Total by group | eval HealthRate=round(HIGH*100/Total,2)    
Hi all, Within Splunk ES I've configured a test threat intelligence feed with the following settings: New > Line oriented Name: Binary Defense Banlist type: network url: https://www.binar... See more...
Hi all, Within Splunk ES I've configured a test threat intelligence feed with the following settings: New > Line oriented Name: Binary Defense Banlist type: network url: https://www.binarydefense.com/banlist.txt weight: 60 interval: 43200 Max Age: -30d Max Size: 52428800 Checked Threat Intelligence File parser: line Delimiting regular exp:  Extracting regex: ^(\d.+)$ Ignoring regex: (^#|^\s*$) fields: ip$1,description:BinaryDefense_banlist skip header lines: 0 No encoding, no user agent, sinkhole checked. Some global parse modifier settings: Certificate attribute breakout = checked IDNA encode domains = unchecked Parse domain from URL = unchecked In debug mode I see that the file is downloaded and then it says: <timestamp> INFO pid=1050977 tid:MainThread file=get_parser.oy:_detect_file_type:139 | stanza"binary Defense Banlist" status="Automatically detected STIX parsing for file_path /opt/splunk/var/lib/splunk/modinputs/threatlist/Binary Defense Banlist" It goes on to parse the file and get the records. However, the records contain HTML elements like <'\div> and <\iframe> as url value. This is strange since it's just a .txt file. Moreover, why is it parsing it like a STIX document when I explicitly stated that the File parser = line? This happens with other threat feeds as well. I've checked with a colleague at another client and with the exact same settings his works and mine doesn't.   Am I missing something? Do you know where else I can look to troubleshoot?   Some figures: Splunk: 8.2.9 ES: 7.0.1 Single search head, behind proxy
    index="hx_vm" LogName="Microsoft-Windows-Sysmon/Operational" "EventCode=11" ComputerName=DESKTOP-933JR8B | eval {name} = replace("C:\Windows\SysWOW64\OneDriveSetup.exe","\", "\\") | search Im... See more...
    index="hx_vm" LogName="Microsoft-Windows-Sysmon/Operational" "EventCode=11" ComputerName=DESKTOP-933JR8B | eval {name} = replace("C:\Windows\SysWOW64\OneDriveSetup.exe","\", "\\") | search Image = name | table _time, TargetFilename     The variable usage part is difficult.
What is the difference between these Add-ons? Is there any reason you would install both? Also, should syslog be turned off on the esxi and vCenter entities to keep from duplicating data? Splunk ... See more...
What is the difference between these Add-ons? Is there any reason you would install both? Also, should syslog be turned off on the esxi and vCenter entities to keep from duplicating data? Splunk Add-on for VMware Metrics (https://splunkbase.splunk.com/app/5089) and Splunk Add-on for VMware (https://splunkbase.splunk.com/app/3215) thanks, Ken
Is there a way to get alerts when routers or switches go down on your network or any endpoint?    V/R SD
Good evening everyone.... Being that the Splunk ADD-ON for Infrastructure is now end of life is there any other way to monitor network devices 
our main Splunk administrator retired and we since disabled his Active Directory account which he used to create and manage hundreds of Splunk searches, now listed as Orphaned under Settings \ All Co... See more...
our main Splunk administrator retired and we since disabled his Active Directory account which he used to create and manage hundreds of Splunk searches, now listed as Orphaned under Settings \ All Configurations \ Reassign Knowledge Objects \ Orphaned we have the option of reassigning these searches to other Domain Accounts belonging to regular Splunk non admin users, or to the built in default Splunk admin account which is a local account on the box with no Domain permissions, so the question is should we do that since there is also this Warning: Knowledge object ownership changes can have side effects such as giving saved searches access to previously inaccessible data or making previously available knowledge objects unavailable. Review your knowledge objects before you reassign them. Running Splunk version 9.0.0 on the Microsoft Windows platform 
Hi,  We're preparing to upgrade SE from 8 to 9 and have a question about this requirement: For distributed deployments of any kind, confirm that all machines in the indexing tier satisfy the follow... See more...
Hi,  We're preparing to upgrade SE from 8 to 9 and have a question about this requirement: For distributed deployments of any kind, confirm that all machines in the indexing tier satisfy the following conditions:  ... ... They do not run their own saved searches If our indexers are also search heads, would that violate this?
I have a SH that is not part of SH Cluster.  The SH is connected to an Index Cluster.  I am seeing the following errors on the Indexers (W.X.Y.Z is the IP address of the SH) ERROR TcpInputProc [231... See more...
I have a SH that is not part of SH Cluster.  The SH is connected to an Index Cluster.  I am seeing the following errors on the Indexers (W.X.Y.Z is the IP address of the SH) ERROR TcpInputProc [2317 FwdDataReceiverThread] - Error encountered for connection from src=W.X.Y.Z:46788. error:140760FC:SSLroutines:SSL23_GET_CLIENT_HELLO:unknown protocol I don't think there is a mismatch of sslVersions.   Please help me troubleshoot this.  
Hi  i am unable to display lable or any result need to display chart area instead of default lables for splunk pie charts  
Hello All, I have been using SimpleXML to create some nice dashboards - with decent visualizations. SimpleXML can: Show or hide panels using tokens, use the same panel but run different searches ... See more...
Hello All, I have been using SimpleXML to create some nice dashboards - with decent visualizations. SimpleXML can: Show or hide panels using tokens, use the same panel but run different searches based on a token, make font size bigger or smaller with css, and use javascript and jquery as well. And use css to highlite text in a string, not just a single value, which seems the only choice in Dashboard Studio - change color on a "match", etc. It seems that I cannot do some or most of those options with Dashboard Studio. Granted, I have just started using Dashboard Studio. I would like to be able to hide or show a table depending on a token, and change color of column in a table. And perhaps us a single table for different searches depending on a token or search result. Most of the examples I have seen for Dashboard Studio depend on metrics, numbers, or counts, etc. The lion's share of my searches are all based on the linux_secure data source and the NIX addon. I am not counting sales, amounts, or items as shown in the Splunk demo for the "Butter Cup" store. I am open to suggestions. It seems to me that the Splunk Dashboard Studio as limitations when compared to SimpleXML. I am open to guidance or suggestions, eholz1
Hello Splunk masters I am trying to figure out how to get a rate (percent) by looking at two strings within a column, then dividing by values in another column Sample data below.  What I'm trying... See more...
Hello Splunk masters I am trying to figure out how to get a rate (percent) by looking at two strings within a column, then dividing by values in another column Sample data below.  What I'm trying to do is calculate the rate of "incomplete" by batch week.  Rate is calculated by taking the batch week, getting the total = (complete + incomplete) / incomplete.  As shown below, I included a sample of what I'd like to get as a final output.  This is way beyond my Splunk-fu and hoping someone can help me out here.   Thanks for the help in advanced       Sample Data site batch_status batch_week status_count 2506 complete 16 7 2506 incomplete 16 4 2506 complete 17 5 2506 incomplete 17 3 2506 complete 18 2 2506 incomplete 18 4 What I'd like to get back 2506 incomplete 16 36% 2506 incomplete 17 38% 2506 incomplete 18 -66%        
not sure what it looks like on the Unix platform but in the Web UI on a Windows Server there is no separate square aka pane for the Deployer Server as in the Search Head Cluster software configuratio... See more...
not sure what it looks like on the Unix platform but in the Web UI on a Windows Server there is no separate square aka pane for the Deployer Server as in the Search Head Cluster software configuration Deployer on the Overview screen, although it is clearly assigned the Deployer role in the Monitoring Console and that is the only role for that Instance (I like to follow the guidelines to the T)  When you click on Topology it shows up under the Other category along with the Cluster Master and Deployment servers  All I'm saying is that it would be nice to be able to see it's performance metrics  on the Overview page along with all its other brother and sister servers 
Hello Splunkers, I have a quick question, Is this possible to simply extract the content of a journal.zst file ? Is it encrypted in some way or should I be able to retrieve the whole raw data out ... See more...
Hello Splunkers, I have a quick question, Is this possible to simply extract the content of a journal.zst file ? Is it encrypted in some way or should I be able to retrieve the whole raw data out of it ? The journal file is located here : <index_path>/db/hot_<whatever>/rawdata/journal.zst Thanks a lot, GaetanVP
Hi,   I'm having some architecture deployment issues on an indexer. When I check hosts using (index="_internal"  | stats count by host). I double-checked my outputs.conf on all my instances, I al... See more...
Hi,   I'm having some architecture deployment issues on an indexer. When I check hosts using (index="_internal"  | stats count by host). I double-checked my outputs.conf on all my instances, I also checked the inputs.conf on indexer2 both are set to 9997 and I believe I have the right local IP running on all my instances but I still don't have any other host pop-up on Indexer2 except Indexer2. Any assistance would be highly appreciated. Side note I'm using AWS to practice setting up my own Architecture for learning purposes any help will be appreciated.   Regards,
I tried official documents and community searches but couldn't find out how to reverse y-axis. not transpose or xy-swap!
Hi, I am trying to use Dashboard Studio to show transactions response times a Single Value with a Sparkline. I have found that Single Value in Dashboard Studio seems to struggle when timechart se... See more...
Hi, I am trying to use Dashboard Studio to show transactions response times a Single Value with a Sparkline. I have found that Single Value in Dashboard Studio seems to struggle when timechart search returns no value for a particular time interval. For instance, if the end of my timechart query has a small 'span=....' value [1],  Splunk Search shows me there are intervals where no aggregate response time is calculated [2] and I get a "missing property: majorValue" message in the Single Value Visualisation window/panel in Dashboard Studio. If I have a large 'span=...' value, splunk search shows me ALL intervals do have an aggregate response time calculated and Dashboard Studio works as expected.  [1] | timechart span=10s P95(response_time_duration_mssec) as RT_P95 [2]  _time RT_P95 2023-01-03 10:59:50 940.000 2023-01-03 11:00:00 999.000 2023-01-03 11:00:10 946.000 2023-01-03 11:00:20 1164.500 2023-01-03 11:00:30 844.250 2023-01-03 11:00:40   2023-01-03 11:00:50 1108.500 2023-01-03 11:01:00 1290.200 2023-01-03 11:01:10 1555.000 (curtailed) I'd rather not hardcode 'span=1min' into my dashboard as I have no way of guaranteeing this problem won't recur at times of low usage. This seems like a bug in Dashboard Studio to me. Please advise & TIA.