All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

How can I find an exact string which has double code in it. I want to find exact string HTTP/1.1" 500
I have a search that writes to a lookup table.  I would like to run this search once a month and update (overwrite) the lookup table.  I see that I can schedule reports, dashboards, and alerts.  Is i... See more...
I have a search that writes to a lookup table.  I would like to run this search once a month and update (overwrite) the lookup table.  I see that I can schedule reports, dashboards, and alerts.  Is it possible to do it with a search that writes to a lookup table file?
Hi team. I'm looking for a query/solution that will alert me when a log source is no longer sending logs. For example, I have an index called "linux_prod" which is populated when linux hosts fortheir... See more...
Hi team. I'm looking for a query/solution that will alert me when a log source is no longer sending logs. For example, I have an index called "linux_prod" which is populated when linux hosts fortheir events. I would like to receive an alert when this index stops receiving events for the past 1 hour.  This happens when SC4S or some other issue on the network have problems.  Thank you.
Anyone have a search that will return the indexed events per second across the entire indexer cluster?
The following is my ideal final query to be used in a dashboard.     index=cdn_app httpMessage.host=taxes* | eval _env=$env_host$ | eval _hostName=case(_env=="http:abc-h123-apps-prod","taxes.s... See more...
The following is my ideal final query to be used in a dashboard.     index=cdn_app httpMessage.host=taxes* | eval _env=$env_host$ | eval _hostName=case(_env=="http:abc-h123-apps-prod","taxes.sf.com", _env=="http:abc-h123-apps-qa", "taxes-qa.sf.com") | search httpMessage.host=_hostName | spath output=status path=httpMessage.status | eval status=case(like(status, "2%"),"2xx",like(status, "4%"),"4xx",like(status, "5%"),"5xx") | stats count by status   It seems `_hostName` is not resolving even when I hardcode and values like so.     index=cdn_app httpMessage.host=taxes* | eval _env="taxes.sf.com" | eval _hostName=case(_env=="http:abc-h123-apps-prod","taxes.sf.com", _env=="http:abc-h123-apps-qa", "taxes-qa.sf.com") | search httpMessage.host=_hostName | stats count by httpMessage.host   I'm sure its with my eval case because this works just fine.     index=cdn_app httpMessage.host=taxes* | search httpMessage.host="taxes.sf.com" | stats count by httpMessage.host   Open to any suggestions. Thanks!    
I'm looking for a search I can run that will return the ingest rate (KB/s) across the entire cluster.  I know there's a "Deployment-Wide Total Indexing Rate" panel in the DMC dashboard "Indexing Perf... See more...
I'm looking for a search I can run that will return the ingest rate (KB/s) across the entire cluster.  I know there's a "Deployment-Wide Total Indexing Rate" panel in the DMC dashboard "Indexing Performance: Deployment" that contains this data but I need to recreate this on the cluster itself to push to a summary index for retention and quick export.  Also, if there's a similar search that will return events/s, I'm looking for that as well.
Hi,   I have dashboard with multiple panels. Some of them I succeeded to only show them when there is a result. Now I would like this also for some single value vis.  The single value displays ... See more...
Hi,   I have dashboard with multiple panels. Some of them I succeeded to only show them when there is a result. Now I would like this also for some single value vis.  The single value displays '0' when no result. But still is showing in the dashboard. How can I fix this?     </panel>     <panel depends="$panel_show4$">       <title>Test_Panel_4</title>       <single>         <search>           <progress>             <condition match="'job.resultCount' &gt; 0">               <set token="panel_show4">true</set>             </condition>             <condition>               <unset token="panel_show4"></unset>             </condition>           </progress>
Hi, Can anyone help me with a video or documentation where it shows onboarding the data via server and not from UI. Regards Suman P.
Anyone have any ideas on who created this application.  The app files seem to point to Splunk, however support is unable to investigate as it is listed on splunkbase as "Community" (though it says S... See more...
Anyone have any ideas on who created this application.  The app files seem to point to Splunk, however support is unable to investigate as it is listed on splunkbase as "Community" (though it says Splunk SOAR MobileIron Copyright Splunk Inc.) which is leaving me confused and unsure where else to get answers.   https://github.com/splunk-soar-connectors/mobileiron/blob/next/NOTICE Splunk SOAR MobileIron Copyright (c) 2016-2022 Splunk Inc.   Third-party Software Attributions:   Library: beautifulsoup4 Version: 4.9.1 License: MIT Copyright 2004-2017 Leonard Richardson Copyright 2004-2019 Leonard Richardson Copyright 2018 Isaac Muse   Library: requests Version: 2.25.0 License: Apache 2.0 Kenneth Reitz
Hello, I've following 4 gauges in a panel and I want to change the color only for "Category:4" gauge based on the below values/threshold of "Category:4" gauge. Range            Color 0-79       ... See more...
Hello, I've following 4 gauges in a panel and I want to change the color only for "Category:4" gauge based on the below values/threshold of "Category:4" gauge. Range            Color 0-79               Red 80-99            Yellow 100                Green Note: I don't want to change the color of gauges "Category:1", "Category:2","Category:3" (These gauges have different condition/threshold for color) Thanks for your help in advance. @ITWhisperer @gcusello 
I have a table with 1 column and 6 rows which I'll be changing to 1 row and 6 columns using transpose and eventually hide the header using CSS, such that I only have a row of 6 different values, say ... See more...
I have a table with 1 column and 6 rows which I'll be changing to 1 row and 6 columns using transpose and eventually hide the header using CSS, such that I only have a row of 6 different values, say - A, B, C, D, E, F. I want to display details related to each of those 6 values based on what value is clicked. The query for each of those 6 values are different and hence I have placed them in separate tables, something like - TableA, TableB,...,TableF.  I have come across <condition/> option but I'm not able to make out how I can use that in this scenario. Any leads in achieving this will be of great help.
My colleagues and I have been biting our tongues trying to get the partitioning right with the slim-packaging-toolkit. We manage to package the technical add-on from the source code into the tar.gz... See more...
My colleagues and I have been biting our tongues trying to get the partitioning right with the slim-packaging-toolkit. We manage to package the technical add-on from the source code into the tar.gz file and then execute the command to get the packages for the specified workloads, but they don't differ. We have been trying several things regarding the "tasks" and "inputGroups" specification in the app.manifest file, but we can't manage to split the app so that all the python stuff is only in the forwarder partition and none of it is in the searchhead partition to install it via self-service in splunkcloud. Any kind of help and all materials and resources, apart from the standard documentation, which unfortunately doesn't help much, is very welcome and appreciated.
References: <a href="https://cwe.mtaci.org/dada/definitions/32.html">CWE</a> <a href="https://wnde.org/www-community/goto/Command_defendeon">wnde</a>   I want to extract these into two separate   ... See more...
References: <a href="https://cwe.mtaci.org/dada/definitions/32.html">CWE</a> <a href="https://wnde.org/www-community/goto/Command_defendeon">wnde</a>   I want to extract these into two separate   https://wnde.org/www-community/goto/Command_defendeon https://cwe.mtaci.org/dada/definitions/32.html      
   Good morning This was on one of my search heads. Can anyone help or point me in the right direction for this. Some answers were not very clear to me. If someone can expand that wou... See more...
   Good morning This was on one of my search heads. Can anyone help or point me in the right direction for this. Some answers were not very clear to me. If someone can expand that would be fantastic    Thanks
Hi at all, I configured for my Heavy Forwarder the following values of queues:   [queue=typingQueue] maxSize = 100MB [queue=indexQueue] maxSize = 100MB [queue=aggQueue] maxSize = 100MB [queue=p... See more...
Hi at all, I configured for my Heavy Forwarder the following values of queues:   [queue=typingQueue] maxSize = 100MB [queue=indexQueue] maxSize = 100MB [queue=aggQueue] maxSize = 100MB [queue=parsingQueue] maxSize = 100MB   but when I check the queues I find:   2 - Aggregation Queue 102400 3 - Typing Queue 102400 1 - Parsing Queue 512 4 - Indexing Queue 102400   What could it be the problem? Why parsingQueue hasn't the correct value? could it be another location where this value is setted? Ciao. Giuseppe
Hi, I got a table data with 3 fields (Time, Method, Return) Time Method Return 28/10/2022 Method 1 KO 28/10/2022 Method 2 KO 28/10/2022 Method 1 OK 2... See more...
Hi, I got a table data with 3 fields (Time, Method, Return) Time Method Return 28/10/2022 Method 1 KO 28/10/2022 Method 2 KO 28/10/2022 Method 1 OK 28/10/2022 Method 1 OK 28/10/2022 Method 1 OK 28/10/2022 Method 1 OK ... ... ... 29/10/2022 Method 2 OK 29/10/2022 Method 2 OK 29/10/2022 Method 2 OK 29/10/2022 Method 2 OK 29/10/2022 Method 2 OK 29/10/2022 Method 2 OK 29/10/2022 Method 2 OK   I'd like to make a timechart with double agregation (one per Method, then one per Return) to get this kind of chart The only thing I can do for the moment is this chart with this request     | timechart count(eval(Return="KO")) as KO count(eval(Return="OK")) as OK by Method     Do you know how I can get the first timechart ?   Thanks  
I am trying to use the rex command to extract an id number, which is a mixture of letters and numbers separated by a dash. For example, one of the ids looks like this: 34gv564-3333-5tg4-gt53-4rgt5e... See more...
I am trying to use the rex command to extract an id number, which is a mixture of letters and numbers separated by a dash. For example, one of the ids looks like this: 34gv564-3333-5tg4-gt53-4rgt5eg5g35gb The field itself is as follows: MFA challenge succeeded for account aaaaaaaaa with email example@example.co.uk. Session id is 34gv564-3333-5tg4-gt53-4rgt5eg5g35gb The rex command I'm using is as follows:   | rex "(?i) is (?<id_number>[^\"]+)"   The only problem is that sometimes it extracts the email address bit too Any help would be greatly appreciated
Hi, In the indexer clustering> Data Durability . Root cause(s):    .   search Factor is not met       . Unhealthy Instances:       .com1-536367373.xxx.splunkcloud.com   how to fix this ... See more...
Hi, In the indexer clustering> Data Durability . Root cause(s):    .   search Factor is not met       . Unhealthy Instances:       .com1-536367373.xxx.splunkcloud.com   how to fix this issue ? Thanks...              
Hi, i'm trying to extract substring from a field1 to create field3 and then match field2 with field3    The search is: index=antispam sourcetype=forcepointmail:sec  | fields msg suser from | ... See more...
Hi, i'm trying to extract substring from a field1 to create field3 and then match field2 with field3    The search is: index=antispam sourcetype=forcepointmail:sec  | fields msg suser from | where NOT LIKE(suser,"%".from."%") But from=Domain noreply <noreply@domain.com>  suser=noreply@domain.com I need to extract the substring contained between <> in the "from"  field and match field "suser" with "created_field" .   I want to find each mail where the "From" field is different from "suser" field, so I can find spoofed mails on our antispam device.   thx
Hi Splunkers, I have a doubt about the Splunk parsing capacity. Until now, every time I needed to parse data, I used add-on, both custome wrote by me and downloaded from Splunk base. If I remeber... See more...
Hi Splunkers, I have a doubt about the Splunk parsing capacity. Until now, every time I needed to parse data, I used add-on, both custome wrote by me and downloaded from Splunk base. If I remeber well, but correct me if I'm wrong, an add-on is not required (or may be not required) if we have a well structured data format, like JSON or XML . My question is: if the above assumption is right, are there any other case where Splunk can perform parsing without an add-on help? And if yes, what are they?