All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

I have daily user login/logout data like this: date,user,action 2020-04-14 01:00:00,user1,login 2020-04-14 01:05:00,user2,login 2020-04-14 01:10:00,user3,login 2020-04-14 02:40:00,user2,logout ... See more...
I have daily user login/logout data like this: date,user,action 2020-04-14 01:00:00,user1,login 2020-04-14 01:05:00,user2,login 2020-04-14 01:10:00,user3,login 2020-04-14 02:40:00,user2,logout 2020-04-14 02:50:00,user3,logout 2020-04-14 03:10:00,user2,login 2020-04-14 03:10:00,user1,logout 2020-04-14 03:30:00,user3,login 2020-04-14 04:20:00,user2,logout Users can login/logout multiple times in a day. A session closes and then new session opens. (like user2) I need to get the duration for every session and there is no session id. How can i merge this two events in one row: Login and first logout after login. Like this: login_date,logout_date,user 2020-04-14 01:00:00,2020-04-14 03:10:00,user1 2020-04-14 01:05:00,2020-04-14 02:40:00,user2 2020-04-14 01:10:00,2020-04-14 02:50:00,user3 2020-04-14 03:10:00,2020-04-14 04:20:00,user2 2020-04-14 03:30:00,-,user3 
As the title says, Splunk Web GUI does not show after I restart Splunk server from CLI. Help?
Hi, I'm looking for a way to change the hour of a time variable Exemple : myTime="2022-11-20 05:23:42" and I want myTime to be equal "2022-11-20 08:00:00" How can I proceed please ? Tha... See more...
Hi, I'm looking for a way to change the hour of a time variable Exemple : myTime="2022-11-20 05:23:42" and I want myTime to be equal "2022-11-20 08:00:00" How can I proceed please ? Thanks
I am new to splunk. Creating a report to count the successful and error logins to my system. The report shows the two columns but when I put the report on my dashboard, it adds two columns, span and ... See more...
I am new to splunk. Creating a report to count the successful and error logins to my system. The report shows the two columns but when I put the report on my dashboard, it adds two columns, span and span_days. I can't figure out how to remove those two extra columns. Any advice?
I have a lookup table with three columns Endpoints, Rate, Window I want to get the window value for a particular endpoint provided by me which i will use in my main query The Query looks like thi... See more...
I have a lookup table with three columns Endpoints, Rate, Window I want to get the window value for a particular endpoint provided by me which i will use in my main query The Query looks like this sourcetype="blabla" http_url = "some endpoint" minutesago= |inputlookup SomeFile.csv | search Endpoint = "Some endpoint" | return Window I get an error running this query Error in 'search' command: Unable to parse the search: Comparator '=' is missing a term on the right hand side. Can anyone help?
I have a search with a subsearch. I run into the limitations of the maximum results (50.000) Now Ia m trying to figure out to rebuild my search but I am stuck. Can anyone guide to the right directi... See more...
I have a search with a subsearch. I run into the limitations of the maximum results (50.000) Now Ia m trying to figure out to rebuild my search but I am stuck. Can anyone guide to the right direction? My search now :  <> index=TEST | search logger="success - Metadata:*" [ search index=TEST | search logger="Response: OK]" | fields message.messageId] | stats dc(message.messageId)</>
Hi, I am doing Boss of the SOC v1 and I stuck on question, where I need to use lookup. I imported .csv file ad here are my commands: index=botsv1 dest=192.168.250.70 src="23.22.63.114" http_metho... See more...
Hi, I am doing Boss of the SOC v1 and I stuck on question, where I need to use lookup. I imported .csv file ad here are my commands: index=botsv1 dest=192.168.250.70 src="23.22.63.114" http_method=POST | rex field=form_data "passwd=(?<passwd>[a-zA-Z]{6})" | lookup coldplay.csv Song as passwd OUTPUTNEW song   Error I get: Error in 'lookup' command: Could not find all of the specified destination fields in the lookup table.   Here I can find writeup with similar command: https://www.aldeid.com/wiki/TryHackMe-BP-Splunk/Advanced-Persitent-Threat##7_-_One_of_the_passwords_in_the_brute_force_attack_is_James_Brodsky%E2%80%99s_favorite_Coldplay_song._Which_six_character_song_is_it? I tried to run it and I received the same error.   Do you know how can I solve it? 
Hi I have Firepower . and sends my logs with estreamer to Splunk. my problem : Splunk keeps logs for 70 days, and before 70 days I don't have any logs on Splunk. How do I keep my logs for 1 ye... See more...
Hi I have Firepower . and sends my logs with estreamer to Splunk. my problem : Splunk keeps logs for 70 days, and before 70 days I don't have any logs on Splunk. How do I keep my logs for 1 year on Splunk? I read some notes about maxTotalDataSizeMB and frozenTimePeriodInSecs , that I must change the value in indexs.conf, but I dont know where I change them (GUI or CLI)? I have many indexes.conf file whenever I search for it. I changed maxTotalDataSizeMB value of 500gig to 800gig in index.conf in path opt/splunk/etc/system/local but I don't find any parameter of frozenTimePeriodInSecs in that. Whenever I use df -h command in cli, it shows, used 498gig of 840gig disk .and this parameter change between 488 and 498 gig .   Can anyone help me?  
My sample events look like this , API logs   { location: Southeast Asia, properties: { backendMethod: GET errors: [ {some huge nested object}, {some huge nested objec... See more...
My sample events look like this , API logs   { location: Southeast Asia, properties: { backendMethod: GET errors: [ {some huge nested object}, {some huge nested object} ] } }   I want to search only the events with the "errors" field. If the API is successful, it does not have this "errors" field, and I don't want to search them. I have tried {baseSearch}  | where mvcount('properties.errors') > 0 , this return nothing {baseSearch}  | where mvcount("properties.errors") > 0 , returning even the events without the "errors" field {baseSearch}  | where isnotnull('properties.errors'), this return nothing {baseSearch}  | where isnotnull("properties.errors"),returning even the events without the "errors" field {baseSearch}  |  "properties.errors"=*.  ,  this return nothing I just need something simple like {baseSearch}  |  where exist(properties.errors), what is the most simple way
Can anyone please answer my questions : Are the Apps bundled by default in Splunk Cloud  upgraded at the same time as the Splunk Cloud instance is upgraded? Is it possible to prevent only Apps ... See more...
Can anyone please answer my questions : Are the Apps bundled by default in Splunk Cloud  upgraded at the same time as the Splunk Cloud instance is upgraded? Is it possible to prevent only Apps from being upgraded when the Splunk Cloud instance is upgraded?
Hello Splunkers ,   I want to know if we can create a timechart that will show only values when they change ..If  there is a change in field value Below is the timechart of events every min... See more...
Hello Splunkers ,   I want to know if we can create a timechart that will show only values when they change ..If  there is a change in field value Below is the timechart of events every minute 2022-12-12 20:41:00 IDLE 2022-12-12 20:40:00 ACTIVE 2022-12-12 20:39:00 FALSE 2022-12-12 20:38:00 FALSE 2022-12-12 20:37:00 FALSE 2022-12-12 20:36:00 TRUE 2022-12-12 20:35:00 TRUE 2022-12-12 20:34:00 TRUE 2022-12-12 20:33:00 TRUE 2022-12-12 20:31:00 NEGATIVE 2022-12-12 20:30:00 NEGATIVE 2022-12-12 20:29:00 NEGATIVE 2022-12-12 20:28:00 TRUE     I am looking for 2022-12-12 20:41:00 IDLE 2022-12-12 20:40:00 ACTIVE 2022-12-12 20:39:00 FALSE 2022-12-12 20:36:00 TRUE 2022-12-12 20:31:00 NEGATIVE 2022-12-12 20:28:00 TRUE     Thanks in advance!!
Hello dear community Could you please tell me how to find the reason. I am using HTTP Event Collector for Kubernetes. I have a configured data token coming into the index. But the team I'm h... See more...
Hello dear community Could you please tell me how to find the reason. I am using HTTP Event Collector for Kubernetes. I have a configured data token coming into the index. But the team I'm helping assures me that the data in the index gets lost and it's not all sent to Splunk. Maybe someone has already encountered such a problem and perhaps the limits for data transfer are to blame? but I don't know how to check it. I tried to do a search in _internal on the index for which there are complaints. But perhaps you have a better way. Also, an application is installed on my HF, where all the indices and tokens for them are registered there, I found a file with limits. How can I see how much data is coming in for a token and if the values ​​are stuck?
I was pretty sure back when we installed the system we limited a bunch of things, but now I cannot find the configuration anywhere.  In the typical /opt/splunk/etc/system/local on my Splunk Server I ... See more...
I was pretty sure back when we installed the system we limited a bunch of things, but now I cannot find the configuration anywhere.  In the typical /opt/splunk/etc/system/local on my Splunk Server I do not seem to have the inputs.conf file anymore?  Is there where I would limit my ingesting or do I do it on the Splunk Forwarder level? I am getting a lot of 4634 which is filling up my license quota.  I want to not log the Logon Type 3's.  Can I just create the file where it should be and start adding things there or how should I go about it?
I was trying to join a group of documents with a list of users that I had in a lookup, and the search return me results and always works fine, but the problem its when I try to table another of the f... See more...
I was trying to join a group of documents with a list of users that I had in a lookup, and the search return me results and always works fine, but the problem its when I try to table another of the fields of the lookup. The search that return me one result, doesn't return me nothing, and I cant understand why, cause the table doesn't should affect the results or the search.   Even I try to change the name or different things like list the lookup and search the documents, but simply doesnt work     this is when I try to table "Nombre", the search doesn't return results But this is exactly the same search and if I dont put the field "Nombre" , return me results       this is the lookup, and if I search the document that match in the join, I see that effectively have the field "Nombre"   In all the searches have a range of 7 days ago,  
Hi, I am new to splunk and have a requirement where i have to search the logs which are on 100 servers and i have to figure if each log may consist 2 statements as below ex: "started step1" "st... See more...
Hi, I am new to splunk and have a requirement where i have to search the logs which are on 100 servers and i have to figure if each log may consist 2 statements as below ex: "started step1" "started step2" source of log contains actual name of source where i can check the step (location of log /test/test1/ABC.log ,/test/test1/CDE.log,/test/test1/DEF.log) which i figured out based on rex command (using regex)  I want a table which contain for each log how many step are completed. like: ABC      started step1  started step2 CDE    started step1 DEF    started step1 started step2
Hi everyone. I just wanted to ask if there is a way  to install and manage Splunkbase apps in Splunk Cloud platform through Terraform code. I found this https://registry.terraform.io/providers/sp... See more...
Hi everyone. I just wanted to ask if there is a way  to install and manage Splunkbase apps in Splunk Cloud platform through Terraform code. I found this https://registry.terraform.io/providers/splunk/splunk/latest/docs/resources/apps_local , but for the name I assume Its only for Splunk Enterprise instances.
Hello - I have a requirement where there are 10 user and want to highlight if user is active or inactive. Based on the requirement I have gone with checkbox since there can be multiple users active a... See more...
Hello - I have a requirement where there are 10 user and want to highlight if user is active or inactive. Based on the requirement I have gone with checkbox since there can be multiple users active at same time. Condition -  If the user is active then checkbox should be checked. If the user is inactive then checkbox should be unchecked    We are validating via SPL query if user is active or inactive. Help me with JS Code where we can pass data into checkbox and toggle the checkbox value. i.e. 1 or 0 1 means active 0 means inactive    
Hi All,  I am unsure if this question has been answered already - I couldn't see it.  I have a time field in Splunk that I have created using:  | eval TimeStamp = strftime(_time, "%Y-%m-%d")  ... See more...
Hi All,  I am unsure if this question has been answered already - I couldn't see it.  I have a time field in Splunk that I have created using:  | eval TimeStamp = strftime(_time, "%Y-%m-%d")  In Splunk the format is correct, the problem I am having is when the search is exported to .csv the date format changes to "2022/12/04" from " 2022-12-04" when I need it to stay as the dashed version. The same thing happens when it runs via Splunk scheduler to create a .csv file.  Any ideas on why or how to stop this?  Thanks in advance, any help is appreciated!   
Hello Splunkers. I need help regarding a field with multiple values that must be separated. I have the following log in the following format: PostureReport Policy_Umbrella;Passed Policy_DLP;P... See more...
Hello Splunkers. I need help regarding a field with multiple values that must be separated. I have the following log in the following format: PostureReport Policy_Umbrella;Passed Policy_DLP;Passed Policy_Kaspersky;Passed Policy_Domain;Passed Policy_SCCM;Passed Police_Firewall_Windows;Failed Policy_Crownstrike;Passed I need to separate every Policy with your status. I tried to use mvindex, mvjoin and them separate the events, mvexpand, but none of these worked for me.   Thank you.    
Just installed splunk 9.0.1 on an Ubuntu server and received an influx of internal errors in splunkd.log saying the following: "message from "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/splunk_as... See more...
Just installed splunk 9.0.1 on an Ubuntu server and received an influx of internal errors in splunkd.log saying the following: "message from "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/splunk_assist/bin/uiassets_modular_input.py" splunk.LicenseRestriction: [HTTP 402] Current license does not allow the requested action" What exactly is the forwarder trying to do that is causing this error to show? I've also attempted to add an enterprise license but receive the same error.