All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi, Apologies if the subject is a bit vague but I would like to know if there is a way to check overall Events Per Second ingestion? Is it through the Monitoring Console? Thank you in advance. Mik... See more...
Hi, Apologies if the subject is a bit vague but I would like to know if there is a way to check overall Events Per Second ingestion? Is it through the Monitoring Console? Thank you in advance. Mikhael
Hi all, I would like to ask this.   So for example I assigned app1 and app2 into a server class. How can I find out the index that app1 and app2 use.   I know the alternative way is to look thro... See more...
Hi all, I would like to ask this.   So for example I assigned app1 and app2 into a server class. How can I find out the index that app1 and app2 use.   I know the alternative way is to look through the file system > etc > Deployment App > local  > index=test But is there a way to find out the index, without going into the machine file system or CLI.   Thank you for any help provided.
Hi, I'm trying to convert my classic dashboard to studio, and one of my bar charts is in trellis layout. For context this is my code: index | search tenant = "*" | dedup id, tenant | stats count ... See more...
Hi, I'm trying to convert my classic dashboard to studio, and one of my bar charts is in trellis layout. For context this is my code: index | search tenant = "*" | dedup id, tenant | stats count as total_devices by tenant | join type=left [index | dedup id, tenant | where time > (now()-86400) | stats count as available_devices by tenant] | eval available_devices = if(isnull(available_devices) OR available_devices="", "0", available_devices) | eval unavailable_devices = total_devices - available_devices   Ideally, the trellis layout will separate the results by tenant. However, when I use the splitSeries option, it separates into total_devices, available_devices, and unavailable_devices instead. Thanks! Any help will be appreciated.
I have two events where in order to get a response time, I need to subtract the two timestamps. However, this needs to be grouped by "a_session_id" / "transaction_id." The two events I need are circl... See more...
I have two events where in order to get a response time, I need to subtract the two timestamps. However, this needs to be grouped by "a_session_id" / "transaction_id." The two events I need are circled in red in the screenshot attached. I need those two events out of the three events. Every "a_session_id" has these three logs. source="/apps/logs/event-aggregator/gateway_aggregator_events.log" is always after source="/logs/apigee/edge-message-processor/messagelogging/gateway-prod/production/Common-Log-V1/14/log_message/gateway.json" Please let me know if you need more information. Such as snippets on the SPL. Any assistance is much appreciated!
Hello I try to summarize the different steps to onboard automatically a csv file in Splunk 1) On the forwarder: - I need an inputs.conf to tell the forwarder what data to send. (And eventually pro... See more...
Hello I try to summarize the different steps to onboard automatically a csv file in Splunk 1) On the forwarder: - I need an inputs.conf to tell the forwarder what data to send. (And eventually props.conf) http://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf - I also need an outputs.conf to tell the forwarder where to send the data.  inputs.conf [monitor://C:\Program Files\SysCheck\Logs\*.txt] outputs.conf [tcpout:anyName] server=indexer.myco.com:9997 http://docs.splunk.com/Documentation/Splunk/latest/Admin/Outputsconf   2) On the indexer I need to configure the receiving port on http://docs.splunk.com/Documentation/Splunk/6.2.1/Forwarding/Enableareceiver Is it correct? Thanks
Hi Wondering if someone can assist, Want to Implement and test DHCP spoofing and ARP poisoning detection/alerting using Splunk enterprise as SIEM. thank you
Hello, how to remove and clean corrupt peer (indexer) from cluster? Should we stop it then after hardware maintenance delete all indexes data directories then start it again to resync whole data ... See more...
Hello, how to remove and clean corrupt peer (indexer) from cluster? Should we stop it then after hardware maintenance delete all indexes data directories then start it again to resync whole data from other peers? Thanks!  
I am trying to UPGRADE using Ansible, I kick off the playbook via the bastion host. Here are the tasks. 1. copy the install file to remote 2. stop the Splunk service 3. install Splunk Forwarder... See more...
I am trying to UPGRADE using Ansible, I kick off the playbook via the bastion host. Here are the tasks. 1. copy the install file to remote 2. stop the Splunk service 3. install Splunk Forwarder 9.1 4. reboot 5. start the Splunk service All are fine until step 4. I ssh to the specific host and checked the status. It was not running. I scratched my head and tried something like below. sudo to root /opt/splunkforwarder/bin/splunk version it prompted for the license & perform upgrade message. I typed Y for both options. after a few minutes (it showed a message to disable boot start), returned to prompt. disabled boot start reboot sudo systemctl start splunk Finally, it's up & running.  How do I fix step 5. I have 100s of ec2 instances to upgrade.  
I am using a normal pie chart to visualise data on Splunk Dashboard. I would really love if I can add a donut pie chart instead of normal pie chart. Is it possible to add it on Splunk?
I have a log which looks like follow:   Request received :: Id assigned. --- Id=1, BODY={"userIds":["11"],"email":"test@test.com,"Client":"Test"}   The userids will always contains one element ... See more...
I have a log which looks like follow:   Request received :: Id assigned. --- Id=1, BODY={"userIds":["11"],"email":"test@test.com,"Client":"Test"}   The userids will always contains one element in the list surrounded by square brackets. So from above request I want to get 11. I am using rex to extract userID but seems that its not working.   index=prod-* sourcetype="kube:service" "Request received " | rex field=_raw "userIds\":\[\"(?<user_id>\d+)\"" |table user_id   But table is getting printed empty
Hi Team my data across multiple  indices looks  like this from  latest index to oldest oldest                   latest       Index 1         index 2... See more...
Hi Team my data across multiple  indices looks  like this from  latest index to oldest oldest                   latest       Index 1         index 2          index  3       par  lkg target workweek   par  lkg target workweek   par  lkg target workweek a 1 8 ww1   a 5 8 ww2   a 4 8 ww3 b 2 9 ww1   b 6 9 ww2   b 5 9 ww3 c 3 7 ww1   c 7 7 ww2   c 8 7 ww3 d 4 6 ww1   d 8 6 ww2   d 2 6 ww3   I want to recreate data like this par Target ww1 ww2 ww3 line chart a 8 1 5 4   b 9 2 6 5   c 7 3 7 8   d 6 4 8 2     The major catch  is  .... we do not know  how  many indices are there .....we do no know how many par are there in any index and how to automate splunk to create  line chart for each of these par showing  lkg trend across the workweeks. @Richfez  @richgalloway  @ITWhisperer  @aljohnson_splun @PickleRick autom
I have a field with data like this: loggingObject.methodName="WXYX.MNOController.myMethodName". loggingObject.methodName="DEF.GHI.TUVController.myMethodName2"   I want to extract just the myM... See more...
I have a field with data like this: loggingObject.methodName="WXYX.MNOController.myMethodName". loggingObject.methodName="DEF.GHI.TUVController.myMethodName2"   I want to extract just the myMethodName part.  If the dot before it is there, that is fine. I tried using the reg ex field extractor, this is what it came up with: ^(?:[^\.\n]*\.){9}(?P<methodName>\w+) But it seems like it's creating a name for the extracted field, "methodName". I then tried to use it my query like this:   | regex methodName="^(?:[^\.\n]*\.){9}(?P<methodName>\w+)"   But it doesn't work.  There also isn't anything in that line that tells it to extract from the loggingObject.methodName field specifically. How can I extract what I'm trying to extract?
Hi,  I am trying to show successful validations and failures in one of the dashboard panels. I am logging exceptions in traceData.exception field. In this field there is exception with full stacktr... See more...
Hi,  I am trying to show successful validations and failures in one of the dashboard panels. I am logging exceptions in traceData.exception field. In this field there is exception with full stacktrace , but would like to display just exception name so need to extract just first line of exception. My query looks like index=xxx sourcetype="xxx" app=xxx event.data.request.uri="/xxx" | rename event.data.response.statusCode as statusCode | rename event.traceData.exception as exception | rex field=exception "(?<exception>.*)" | eval result = if(statusCode=201,"Valid", 'exception') | timechart span=1h count by result​ the issue is it displays "Valid" calls, but for exceptions it just displays one exception, and the other one is NULL.    _time Valid Token invalid  NULL 2022-10-13 08:00 1 1 1   Both exceptions have the same fields (just different exception values and stacktrace). Could you help me with the query which will display results and extract all the exceptions without stacktrace ?
Hello, I have a data source with dynamic structure, position of comma separated field/value changes for some of the events. A few sample events and the extraction I used are giving below. My extrac... See more...
Hello, I have a data source with dynamic structure, position of comma separated field/value changes for some of the events. A few sample events and the extraction I used are giving below. My extraction is working for event one, but not working for other 2 events as field/values position changes there. Is there any way we can use one field extraction code to address this issue will be highly appreciated. Thank you so much. Timestamp:(?P<TIME_STAMP>.+), Type:(?P<TYPE>.+), EType:(?P<EType>.+), TCode:(?P <TCode>.+), EventId: (?P<EventId>.+), Id: (?P<Id>.+),  SAddress: (?P<SAddress>.+), System: (?P< System >.+), SId: (?P<SId>.+), eSignCode: (?P< eSignCode >.+), RCode: (?P< RCode >.+), Error: (?P< Error >.+) 2022-10-12 06:42:36.591 { INFO } [default task-79] - Timestamp: 2022-10-12T11:42:39.591Z, eSignCode: 3012, Type: REGT, EType: ESIGN, TCode: 23005, EventId: GET_SIGN, Id: 12045, SAddress: 35.168.40.67,  System: EIVES, SId: =/=S()A.b(X(-yJrV/+do)f(Q_)uca-/6+o_v.k|39OYc+Fh_=YOX-iDA++===,  RCode: 000, Error: nullm 2022-10-12 06:42:30.591 { INFO } [default task-79] - Timestamp: 2022-10-12T11:42:30.591Z, Type: REGT, TCode: 23305,  Id: 12045, SAddress: 35.168.40.67, System: EIVES, SId: =/=S()A.b(X(-yJrV/+do)f(Q_)uca-/6+o_v.k|39OYc+Fh_=YOX-iDA++===, eSignCode: 3012, EventId: GET_SIGN, Error: nullm 2022-10-14 06:42:26.591 { INFO } [default task-79] - Timestamp: 2022-10-12T11:42:26.591Z, Type: REGT, TCode: 23015, EventId: GET_SIGN, RCode: 010, Id: 12045, SAddress: 35.168.40.65, System: EIVES, SId: =/=S()A.b(X(-yJrV/98do)f(Q_)tca-/6+o_v.k|39OYc+Fh_=YOX-iDA++===, EventId: GET_SIGN,  Error: nullm  
Hi All, I'm trying to optimize the following search because it runs very slow.  Looking for some help w/it.  I've been exploring the multi-search command also, but cannot figure out how to get it w... See more...
Hi All, I'm trying to optimize the following search because it runs very slow.  Looking for some help w/it.  I've been exploring the multi-search command also, but cannot figure out how to get it working yet... | union [search index=xmo2-aws host=xmo2-prod* sourcetype=oss_app_log "Step completion_code set/reset" (flow_name=UcdeDeviceOnboarding AND step_name=ShowDeviceProgramOffer AND completion_code=0) | join type=inner session [search index=xmo2-aws host=xmo2-prod* sourcetype=oss_app_log "Step completion_code set/reset" (flow_name=UcdeDeviceOnboarding AND step_name=ShowBackupDeviceProgramOffer AND completed_from_ui=False AND completion_code=0)] | join type=inner session [search index=xmo2-aws host=xmo2-prod* sourcetype=oss_app_log "Step completion_code set/reset" (flow_name=UcdeDeviceOnboarding AND step_name=SetUserOnboardingComplete AND completion_code=0)] | timechart span=5m dc(session) as total1] [search index=xmo2-aws host=xmo2-prod* sourcetype=oss_app_log "Step completion_code set/reset" (flow_name=UcdeDeviceOnboarding AND step_name=ShowDeviceProgramOffer AND completion_code=0) | join type=inner session [search index=xmo2-aws host=xmo2-prod* sourcetype=oss_app_log "Step completion_code set/reset" (flow_name=UcdeDeviceOnboarding AND step_name=ShowBackupDeviceProgramOffer AND completed_from_ui=False AND completion_code=0)] | join type=inner session [search index=xmo2-aws host=xmo2-prod* sourcetype=oss_app_log "Step completion_code set/reset" (flow_name=UcdeDeviceOnboarding AND step_name=SetUserOnboardingComplete AND completion_code=0)] | join type=inner session [search index=xmo2-aws host=xmo2-prod* sourcetype=oss_app_log "Step completion_code set/reset" (flow_name=UcdeDeviceOnboarding AND step_name=ShowUcdeActivationStatus AND completion_code=0)] | timechart span=5m dc(session) as total2] | timechart span=5m sum(total1) as eval1, sum(total2) as eval2 | eval ActivationFailed=eval1-eval2 | timechart span=5m sum(eval2) as "Accepted & SignedIn", sum(ActivationFailed) as "Activation Failed" partial=f
I'm using RBA and am having issues with duplicate notables for the same thing. For example, I'll get a notable for both a host name and an IP or I'll get one or a userID and an email.  How does as... See more...
I'm using RBA and am having issues with duplicate notables for the same thing. For example, I'll get a notable for both a host name and an IP or I'll get one or a userID and an email.  How does assets and identities work with RBA and the Risk Index? 
Hello Splunkers, We have a requirement where we need to get the consolidated list of alerts in ITSI that  was generated and need to get status of alerts (closed or still active) When i run the belo... See more...
Hello Splunkers, We have a requirement where we need to get the consolidated list of alerts in ITSI that  was generated and need to get status of alerts (closed or still active) When i run the below query  index="itsi_grouped_alerts" source="XXXX" sourcetype = itsi_notable:group, i don't see any status of the alerts. Is there any way where we can have all the alerts from ITSI listed with status
Is there a recommended way to update Splunk apps in clustered environments? Based on some app instructions, the recommended approach is to copy over the app archive contents into /etc/shcluster/app... See more...
Is there a recommended way to update Splunk apps in clustered environments? Based on some app instructions, the recommended approach is to copy over the app archive contents into /etc/shcluster/apps/ (or /etc/manager-apps/ for CM). This overwrites existing contents and should preserve the local directory (unless the upgraded app has a local directory). Should I follow that for all apps? Same question for standalone servers: should I use the above approach or use the install CLI command?
Hello, I have a scenario that I need to confirm if it works with splunk. I have 2 environments Cluster1  Cluster2 I have the same application setup on both environments Appxyz N... See more...
Hello, I have a scenario that I need to confirm if it works with splunk. I have 2 environments Cluster1  Cluster2 I have the same application setup on both environments Appxyz Now I need to check that the versions of Appxyz on Cluster1 and Cluster2 are the same and I send a curl request to https://cluster.Appxyz and https://cluster2.Appxyz the request returns json values like name: thisname, clustername: thisclustername and version: v123 or V321. I need to extract only the version values from the json i.e v123 or v321 where Cluster.Appxyz.version => v123 and Cluster2.Appxyz.version=> v321 In this case: if Cluster1.Appxyz.version is != to Cluster2.Appxyz.version throw some alert stating "mismatched versions" if Cluster1.Appxyz.version is == to Cluster2.Appxyz.version Can this be achieved using splunk?   Thanks
The CIM documentation says that we should install CIM only on SH. But it contains an indexes.conf in default. Should we leave the indexes.conf in the SHC? in this case the index defined inside index... See more...
The CIM documentation says that we should install CIM only on SH. But it contains an indexes.conf in default. Should we leave the indexes.conf in the SHC? in this case the index defined inside indexes.conf wont be usable because is not defined in the indexer cluster. We dont know if it is correct to define the CIM indexes.conf in the SHC instead of the indexers. Anyone managed to install CIM in a clustered environment without issues?