All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

can the prompt block support optional inputs from a user?
Hello! If I have this: Letter Number A 1 A 2 A 3 B 1 B 2   is there a way to get this:   Letter Number A 1   2 ... See more...
Hello! If I have this: Letter Number A 1 A 2 A 3 B 1 B 2   is there a way to get this:   Letter Number A 1   2   3 B 1   2   so that the transition from one set of related rows to the next is clear?    
Hi Team,   I have a requirement to integrate Phantom with SNOW. Now the challenge is in SNOW I require some extra fields to be populated example: Incident Category field should be always Crime an... See more...
Hi Team,   I have a requirement to integrate Phantom with SNOW. Now the challenge is in SNOW I require some extra fields to be populated example: Incident Category field should be always Crime and Assignment Group should be always a particular team Service Now queue name. By using the current App in Splunk Phantom I dont know how to set my required fields.  Kindly suggest.
Hi All, Is it possible to monitor AWS services belongs to multiple AWS accounts under same organization  in Splunk Observability Cloud integration for Infrastructure Monitoring.  Regards, Ankur
I want to get the last index of my target value for a multi-value field. For example,  id chain 1 SendMessage CheckMessage PayForIt 2 CheckMessage SendMessage CheckMessage PayFor... See more...
I want to get the last index of my target value for a multi-value field. For example,  id chain 1 SendMessage CheckMessage PayForIt 2 CheckMessage SendMessage CheckMessage PayForIt 3 PayForIt SendMessage CheckMessage PayForIt 4 SendMessage PayForIt CheckMessage   If "PayForIt" appears, meanwhile  "SendMessage" and "CheckMessage" appears before it, this is a normal event. But if "SendMessage" or "CheckMessage" don't appear, or after "PayForIt", it is a abnormal event. It means you must send message and be verified by SMS before you pay for something! The id 1, 2 and 3 above are normal, 4 is abnormal.  I've tried mvfind like below, but it will treat 2, 3 as abnormal event! eval send=mvfind(chain,"SendMessage") | eval check=mvfind(chain,"CheckMessage") | eval pay=mvfind(chain,"PayForIt") | where isnotnull(pay) and isnotnull(check) and isnotnull(send) and pay>check and check>send
I have data with multiple date fields in GMT time. when I import the data with setting the TZ=Europe/Berlin, I see that the _time in the correct time zone but for other date fields are still in GMT t... See more...
I have data with multiple date fields in GMT time. when I import the data with setting the TZ=Europe/Berlin, I see that the _time in the correct time zone but for other date fields are still in GMT time.     props.conf: [machine_log] BREAK_ONLY_BEFORE_DATE=null CHARSET=UTF-8 FIELD_DELIMITER = , FIELD_NAMES = DB_ID, DateOn, DateHist, DateOff, ExportTime, Item, Machine, Section TIMESTAMP_FIELDS = DateOn, DateHist, DateOff, ExportTime INDEXED_EXTRACTIONS=csv KV_MODE=none LINE_BREAKER=([\r\n]+) NO_BINARY_CHECK=true SHOULD_LINEMERGE=false TZ=Europe/Berlin category=Structured disabled=false pulldown_type=true       I'm still getting data in this way: _time DB_ID DateOn DateHist DateOff ExportTime Item Machine Section 2023-01-03 12:42:38.787 B0123 2023-01-03 11:41:52.897 2023-01-03 11:42:38.787 2023-01-03 11:42:38.787 2023-01-03 11:42:38.787 I01 M01 S01 2023-01-03 12:41:43.847 B0223 2023-01-03 11:40:18.800 2023-01-03 11:41:43.847 2023-01-03 11:41:43.847 2023-01-03 11:41:43.847 I12 MD1 S02   index time in the correct time, but all date fields in the original timing with one hour offset. The question is: How to change all date fields with the correct time zone?   Thanks in advance!
Hi, I have a doubt in the Splunk cloud. In the data inputs section, there is no option as 'rest' to use API for data import. Can you please help me with this? Thanks
Can we use a lookup table to replace in the case like statements?  For Example:           index="example"| eval ErrorMessage=case(like(Errormessage,"%Bad Connection%"),"Check Your Connection",    ... See more...
Can we use a lookup table to replace in the case like statements?  For Example:           index="example"| eval ErrorMessage=case(like(Errormessage,"%Bad Connection%"),"Check Your Connection",               like(Errormessage,"%Wrong Password%"),"Please check the password",               like (Errormessage,"%Invalid code%"),"Please enter a valid code", 1=1,"NEW Error") When the query is like this can we use look up table where if we found the message in A column which contains % wildcards we need to replace it with the one in the B column which has the fixed value?
I'm trying to come up with a Splunk search query that I can use to find when customers have first attempted to log in. We often get call outs regarding credential stuffing attacks, where 100's of acc... See more...
I'm trying to come up with a Splunk search query that I can use to find when customers have first attempted to log in. We often get call outs regarding credential stuffing attacks, where 100's of accounts have attempted to log in, and part of my analysis is finding when these accounts first attempted to log in. At the moment I've got this   index=keycloak | sort time | streamstats first(time) as first_login by username | dedup username | table username, first_login   The usernames are on display, but the 'first_login' column is empty
Hello, I have let's say "inherited" a few searches and try to understand them. here is the search:   | lookup lu_cisco_umbrella_top_1_million domain as ut_domain output domain as cisco_umbrella_do... See more...
Hello, I have let's say "inherited" a few searches and try to understand them. here is the search:   | lookup lu_cisco_umbrella_top_1_million domain as ut_domain output domain as cisco_umbrella_domain | lookup lu_majestic_top_1_million domain as ut_domain output domain as majestic_domain | search cisco_umbrella_domain=no_matches AND majestic_domain=no_matches     where I stumble uppon now is I understand how usually I could match domain to a field in my search results and in the output match another one to another field (like in the splunk lookup examples documentation) but  I can't wrap my head around how this could work with the same field twice? I also don't see the fields majestic_domain or cisco_umbrella_domain in the previous search results so how could this possibly work?  also, is there a way to take those two lookups and transfer it into something like this:      .... (NOT [|inputlookup lu_majestic_top_1_million domain |table domain ]) AND (NOT [|inputlookup lu_cisco_umbrella_top_1_million |table domain ])...     I bet I work in the totally false direction seemingly so I hope someone can help tnx a lot
Hello, i'm trying to add values to an existing field but i'm running into a wall. I have a field name vector and another field name source, the pattern of the source field is XXX - YYY - ZZZ, i o... See more...
Hello, i'm trying to add values to an existing field but i'm running into a wall. I have a field name vector and another field name source, the pattern of the source field is XXX - YYY - ZZZ, i only want to keep the XXX part, so i've done     | eval temp = mvindex(split(source, " - "),0)     then i try to add these result to the vector field like this :     |eval vector = vector + temp     but it doesn't work.   Can you help me ?
Hello Community !  Is it possible to get a list of all the Indexes which are used in ITSI and all the related services to those indexes with a SPL ?  | REST /services/data/indexes | dedup title... See more...
Hello Community !  Is it possible to get a list of all the Indexes which are used in ITSI and all the related services to those indexes with a SPL ?  | REST /services/data/indexes | dedup title | sort title | table title     -  I found this to be helpful but it's not the answer which i'm looking for.  Thank you in advance ! 
Hello Experts,  I would need your help.  My Splunk Enterprise license is going to expire in the next 10 days but I have already installed a new license. Now I have two licenses in Splunk Enterprise... See more...
Hello Experts,  I would need your help.  My Splunk Enterprise license is going to expire in the next 10 days but I have already installed a new license. Now I have two licenses in Splunk Enterprise. first will expire in the next 10 days and the second is the new one. Please guide me if my newly added license will automatically take over when the old license will expire after 10 days or do I need to remove the old license right away so that the newly added license can take place?    
I want to group the below table as below, I have a column we’re numbers are in all series, I want to segregate 100 series separately and 400 series separately and get the count  kindly advise on the ... See more...
I want to group the below table as below, I have a column we’re numbers are in all series, I want to segregate 100 series separately and 400 series separately and get the count  kindly advise on the query  num1   Count of 100series   Count of 400ser 100        100                                 400 123         123                                402 400 402
 I have a field "facilityAlias" for which location can be changed in every api log file. I have to extract that field using Regex method. I have tried Regex statement but not getting expected result.... See more...
 I have a field "facilityAlias" for which location can be changed in every api log file. I have to extract that field using Regex method. I have tried Regex statement but not getting expected result. Regex statement: rex field=_raw "facilityAlias\":\"(?<facility>.*)\"," expected result: Parc de Salut Mar Barcelona current result: Parc de Salut Mar Barcelona","systemName":"CMPSB   Sample Log file: sample log: 2023-01-02 23:36:58,521 [[MuleRuntime].uber.3869: [abcd-message-kdhskhdsk-api].Delete_msg_from_queue.BLOCKING @27fe0275] INFO  com.skdhksh.jsdhjshd.hsd.logging.internal.CustomLoggerOperations - {"environment":"stag36rcf_eu-env","applicationName":"abcd-message-kdhskhdsk-api","correlationId":"kshddhks-3o4u-jshd8-aksdbkadkahd","apiProcessingTime":347,"totalProcessingTime":740,"tracePoint":"END","logMessage":"{\n  \"url\": \"abcd\",\n  \"bucketName\": \"dipeus-data-store\",\n  \"s3versionID\": \"shdkshdkshdkshdkshdkshdkjshd\",\n  \"s3key\": \"ljdljdlajldj]dsdsd\ksdjksjdksjdksjdksjksjd\ksdjksjd\"\n}","txnMetadata":{"bundleId":"ahsdkhsdh-skjdhshdkshd-skdhshdks-skdhkshd","messageType":"abcd","messageSubType":"kdshdkshdks","facilityAlias":"Parc de Salut Mar Barcelona","systemName":"CMPSB","transactionStartTime":1672702617781,"relatesToPatientMerge":false,"inputPayload":"adhkjshdkshdkshdkshd"},"apiStartTime":"1672702618174"}
Can anyone explain what is ad hoc search?
Hi all, I deal with a multi-value fields and try to provide a multiselect dropdown for users. Therefore, I use mvfind() in the setting for Token value(prefix) / Token value(Suffix). Token value(Pr... See more...
Hi all, I deal with a multi-value fields and try to provide a multiselect dropdown for users. Therefore, I use mvfind() in the setting for Token value(prefix) / Token value(Suffix). Token value(Prefix) = isnotnull(mvfind( HWid, " Token value(Suffix) = ")) It works well if I input one HW ID or many HW ID. However, I get trouble in inputing "all". I want to provide users all events by default but I am unable to find a way to do this by using mvfind(). It is similar as wildchar (all any values) to mvfind(). Is there any suggestion on how to provide all events on mvfind() ? Thank you so much! Jouman
I have uploaded the screenshots of logs of same time but in one log stack and task field is empty and in one it is filled . What is the reason behind ?  Can someone help me to figure it out?
My free Splunk cloud acct is locked at the moment. I'm using it for an Interview. Thankfully I've been able to complete my dev and code on the local deployment. I've sent support a email: support at ... See more...
My free Splunk cloud acct is locked at the moment. I'm using it for an Interview. Thankfully I've been able to complete my dev and code on the local deployment. I've sent support a email: support at splunk dot com. I also have a dev license however, I was not able to apply it to my cloud acct when I did have the access. Was a success for a local win 10 server however. Could someone explain to me the brief process of resetting my account. I've used 3 cloud providers and other PaaS's with issues and personally, I'm lost.  
Hello,  Need help with setting alerts for any event not started by a specific time. I have a lookup file with details for many batch jobs with details like job name, Run date, Start time and aler... See more...
Hello,  Need help with setting alerts for any event not started by a specific time. I have a lookup file with details for many batch jobs with details like job name, Run date, Start time and alert time. job name           run date                                                                     Start time     alert time job1                      1st working date of every month                     9:00                  10:00 job 2                     1st working date of every month                    11:00                 12:00 job3                      1st working date of every month                     12:00                13:00 job4                      1st working date of every month                    13:00                 14:00 when the job runs we see an event with job name, start date, start time, end date, end time and status etc. if any job is not started by the alert time on first of every month  I want to trigger an alert to notify the user that the batch job is not started. Appreciate your help. Vijay