All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi    I have a lookup which looks like this no  name     student     rollno 1      john           yes           12 2       George     no             2345 3      jin                yes    ... See more...
Hi    I have a lookup which looks like this no  name     student     rollno 1      john           yes           12 2       George     no             2345 3      jin                yes          111   How can i iterate through this lookup by the 'no' field and display each entry as a result . I only need one result at a time so when i first run the search the result should be no  name     student     rollno 1      john           yes           12   When i run the same search after a minute the result should be   no  name     student     rollno 2       George     no             2345     Please help
I have 3 Search Heads and 3 Indexers with Replication Factor =1 and Search Factor=1. My requirement is to increase this to RF=3 and SF=2 Each indexer has around 800GB of data. Now if I increase the... See more...
I have 3 Search Heads and 3 Indexers with Replication Factor =1 and Search Factor=1. My requirement is to increase this to RF=3 and SF=2 Each indexer has around 800GB of data. Now if I increase the replication factor to 3 does it mean each indexer will end up with around 2.4TB of data post data rebalancing. And what would be the approximate data size in each indexer if RF is set to 2.
Hi,  I need help to extract some field from below logs format. (Im so bad at this). Oct 11 16:06:24 123.12.123.12 SVPN-USR[29489]: {"id":"6767676767","msgid":"6767676767","userInfo":{"userName":"... See more...
Hi,  I need help to extract some field from below logs format. (Im so bad at this). Oct 11 16:06:24 123.12.123.12 SVPN-USR[29489]: {"id":"6767676767","msgid":"6767676767","userInfo":{"userName":"wani","groupId":1519,"groupPath":"/Group ADL/SSAeF","authMethods":""},"clientInfo":{"ip":"123.12.123.12","vip":"123.12.123.12","osType":"WINDOWS","macAddr":"","deviceID":""},"msg":"[accessIP: 123.12.123.129 virtualIP: 123.12.123.12] User wani for session XXXXXXXXXXXX visit ip source ->ip 123.12.123.12 port 10123!","timeStamp":1665475584,"time":"2022-10-11 16:06:24","type":"userlog","logSubType":"access_resource","rcip":"123.12.123.12","actionResult":"success"}   Oct 11 16:06:24 123.12.123.12 SVPN-USR[29489]: {"id":"6767676767","msgid":"6767676767","userInfo":{"userName":"wani","groupId":1477,"groupPath":"/Group ADL/SSADS","authMethods":""},"clientInfo":{"ip":"123.12.123.12","vip":"123.12.123.12","osType":"WINDOWS","macAddr":"","deviceID":""},"msg":"[accessIP: 123.12.123.12 virtualIP: 123.12.123.12] User wani for session XXXXXXXXXXXX visit ip source ->ip 123.12.123.12 port 443!","timeStamp":1665475584,"time":"2022-10-11 16:06:24","type":"userlog","logSubType":"access_resource","rcip":"123.12.123.12","actionResult":"success"}   I want to extract the action result value, for example: action_result = success   Please help!
Hello Splunkers, Is it possible to limit the searchable indexes within a custom app ? For instance, if I create a new app called "myapp" and inside the Search tab of this app, I want to only be... See more...
Hello Splunkers, Is it possible to limit the searchable indexes within a custom app ? For instance, if I create a new app called "myapp" and inside the Search tab of this app, I want to only be able to retrieve results coming from one of my X indexes. Is that possible ? Regards, GaetanVP
Hello, I have some websites I monitor. I want to receive an alert when a website is not available more than 15 minutes. Can you help me create a query for that?
Hi @gcusello  I am using HTML & Plain Text option in email alerts and am trying to make certain texts bold and adding hyperlinks etc. It is not taking the tags, but displays the tags as it when i c... See more...
Hi @gcusello  I am using HTML & Plain Text option in email alerts and am trying to make certain texts bold and adding hyperlinks etc. It is not taking the tags, but displays the tags as it when i check the mails received. How     
동일한 데이터를 로컬 및 원격 검색(연합 검색)을 통해 검색 속도와 비교합니다. 그러나 자동 조회를 사용하는 검색의 경우 검색 속도가 100배 이상 다릅니다. 원격 검색이 훨씬 빠릅니다.(로컬 검색은 10분, 원격 검색은 30초) 왜 이런 속도 차이가 나는지 궁금합니다. 예시) 색인=방화벽 작업=허용 * ACTION은 자동 조회 설정... See more...
동일한 데이터를 로컬 및 원격 검색(연합 검색)을 통해 검색 속도와 비교합니다. 그러나 자동 조회를 사용하는 검색의 경우 검색 속도가 100배 이상 다릅니다. 원격 검색이 훨씬 빠릅니다.(로컬 검색은 10분, 원격 검색은 30초) 왜 이런 속도 차이가 나는지 궁금합니다. 예시) 색인=방화벽 작업=허용 * ACTION은 자동 조회 설정입니다.
Using version 2.1 of the infoblox TA, it is not extracting all the fields correctly. The named_message field seems to have the text 'view 2:' in it, which for the dns_response extraction will extract... See more...
Using version 2.1 of the infoblox TA, it is not extracting all the fields correctly. The named_message field seems to have the text 'view 2:' in it, which for the dns_response extraction will extract this to the dns_view field. However, it only does this for the single extraction, but there are a number of other extractions that do not have this dns_view field and therefore none of the extractions work. In particular, the reply_code never gets set, so this results in all reply_codes in the Network Resolution datamodel ending up as 'unknown'. Has anyone seen this behaviour before and know what the solution might be?  
Hi All, I'm getting the below   splunk add oneshot ./kaseya.txt -index main -sourcetype asset‌ ‌kaseya-edge:agent ERROR: certificate validation: self signed certificate in certificate chain Co... See more...
Hi All, I'm getting the below   splunk add oneshot ./kaseya.txt -index main -sourcetype asset‌ ‌kaseya-edge:agent ERROR: certificate validation: self signed certificate in certificate chain Couldn't complete HTTP request: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed   Since I'm working on my development laptop, I don't care if this is signed or not.  What I need is a way of stopping the error. TIA, Joe
Hello all, I have configured services in ITSI that have KPIs based on KPI Base Searches, and for some reason users with the itoa_user role cannot view the content of the Service Analyzer.  The struc... See more...
Hello all, I have configured services in ITSI that have KPIs based on KPI Base Searches, and for some reason users with the itoa_user role cannot view the content of the Service Analyzer.  The structure shows up in the tree view, but the nodes are all greyed out.   The tile view displays "No results found". The itoa_analyst role has no issues, and if I make itoa_user inherit power then the content loads, but that's not an acceptable workaround.  I also tried to add the differences in capabilities that itoa_user has with power and itoa_analyst roles, but that didn't work either. When I run the KPI Base Search in a normal search window with itoa_user role then it still doesn't run.  With itoa_analyst it does.  The KPI Base Search calls an accelerated data model and I am working in a distributed and clustered (only idx layer) environment. All objects are shared with Global team. I have no idea what is restricting the itoa_user role. Could anybody help? Thanks! Andrew
Hello, I have the search built that generates the results I want. But, the goal is to also be able to track high number of online orders after someone made a retail order. index=data sector=Retail ... See more...
Hello, I have the search built that generates the results I want. But, the goal is to also be able to track high number of online orders after someone made a retail order. index=data sector=Retail | stats earliest(_time) as firstretailapp latest(_time) as lastretailapp by username | join username [| search index=data sector=Online | stats earliest(_time) as firstonlinesale latest(_time) as lastonlinesale by username] | convert ctime(firstretailsale) ctime(lastretailsale) ctime(firstonlinesale) ctime(lastonlinesale) When these results populate, I can not get the firstonlinesale to be a later date than the lastretailsale. I have tried | eval difference =time1-time2, and where difference >1 and other command searches to try and match up something but am unsuccessful.  Thanks!
this query shows all employees in the company: index=EmployeeData AND sourcetype=Directory* earliest=@d | search NOT Hire_Date IN ("2021-11-11","2021-05-22","2022-08-02", "2021-11-11") | search W... See more...
this query shows all employees in the company: index=EmployeeData AND sourcetype=Directory* earliest=@d | search NOT Hire_Date IN ("2021-11-11","2021-05-22","2022-08-02", "2021-11-11") | search Worker !="Level05" Termination_Date="" Training_Performed="" | table First, Last, primaryWorkEmail, Training_Performed I need to compare with a CSV that shows all of the people who did their training, this CSV contains the field Submitted How would you structure the join to compare if xyz employee is in the CSV of people who completed their training?  
Hi all, I have just started using Splunk dashboards to visualise my data, sorry for asking such a simple question. I have added single value panel on my dashboard which shows the verdict of the test ... See more...
Hi all, I have just started using Splunk dashboards to visualise my data, sorry for asking such a simple question. I have added single value panel on my dashboard which shows the verdict of the test performed. I am using the following the source code: ``` <row> <panel> <single> <title>Verdict</title> <search> <query>index=test_index | search splunk_id="$splunk_id$" | table verdict </query> </search> <option name="colorMode">block</option> <option name="drilldown">none</option> <option name="height">60</option> <option name="rangeColors">["0x53a051","0x0877a6","0xf8be34","0xf1813f","0xdc4e41"]</option> <option name="useColors">1</option> </single> </panel> </row>   ``` It creates a panel with black background colour with text in white colour at the centre. So verdict will give only 2 values ('Pass' or 'Fail'). What I want is the panel should have green background colour is verdict is 'Pass' and red colour background if verdict is 'Fail'. Along with this I would like to have 'Pass' and 'Fail' written in black colour rather than white colour. I am not the admin of the Splunk server so I cant add and javascript file or css file to the source code.  Any help would be hugely appreciated. Thanks! @bowesmana can you help me out here if you can? Thanks!
I have below format log messages. At the end I want to group the messages by BID. { "details" : [ { "BID" : "123" }, { "BID" : "456" } ] } These BIDs correspond to some static fields which des... See more...
I have below format log messages. At the end I want to group the messages by BID. { "details" : [ { "BID" : "123" }, { "BID" : "456" } ] } These BIDs correspond to some static fields which describe what BID is. Like BID :  123 corresponds to Apple. This detail/description is however not present in the events or search results. The mappings are present in the lookup.csv file with BID and description as 2 columns, which I am using for lookup. But the description is field is getting displayed at the end rather than after/before the BID. I want to show the below expected output but its showing the below actual output.  Expected Output Description BID Count Apple 123 4 Orange 456 3   Actual Output BID Count Description 123 4 Apple 456 3 Orange   I am using below query, Is there any way to achieve the expected output?  MY_SEARCH | spath | rename "details{}.BID" as BID | stats count as Count by BID | lookup lookup.csv BID as BID OUTPUT description as description  
I'm going to implement AppDynamics to a .net core 6 rest api, and I can't get a successful connection. I followed the steps from the link below: https://docs.appdynamics.com/appd/22.x/latest/en/a... See more...
I'm going to implement AppDynamics to a .net core 6 rest api, and I can't get a successful connection. I followed the steps from the link below: https://docs.appdynamics.com/appd/22.x/latest/en/application-monitoring/install-app-ser[…]agent/install-the-net-core-microservices-agent-for-windows What I notice is a single line in the profiler log and nothing else 2022-10-10 15:55:33.258255[0x00001b94]<info>:Use CoreCLR profiler With that type of log, I can't even infer if it's a connection issue or an implementation issue. Is there a demo project for visual studio, a sample to base on?
I have a lookup table named ics_special_domains that contains this: domain_name,type microsoft.com,microsoft *.microsoft.com,microsoft google.com,google *.google.com,google nwngms.com,ot *.nw... See more...
I have a lookup table named ics_special_domains that contains this: domain_name,type microsoft.com,microsoft *.microsoft.com,microsoft google.com,google *.google.com,google nwngms.com,ot *.nwngms.com,ot gasco.com,it *.gasco.com,it I'm trying to use this in a search to filter on specific types, but I'm trying a basic search first.  This is the most basic search I'm trying: index=ics_dns ( query_type="A" OR query_type="AAAA" ) | lookup ics_special_domains domain_name as query{} outputnew type as domain_type | where domain_type="microsoft" It returns this error: basic_string::erase: __pos (which is 18446744073709551615) > this->size() (which is 0) I'd appreciate any help figuring this out.
I'm trying to get both JSON and syslog information from our firewall into Splunk Cloud using universal forwarder.   So far I've gotten the JSON in by getting splunk to listen to port 514, forward th... See more...
I'm trying to get both JSON and syslog information from our firewall into Splunk Cloud using universal forwarder.   So far I've gotten the JSON in by getting splunk to listen to port 514, forward that to the index, and then adding it using  splunk add udp 514 -sourcetype JSON However, now I want to add the syslog information as well, which comes over the same port.  When I attempt to add that I get an error: splunk add udp 514 -sourcetype syslog Parameter name: UDP port 514 is not available. How do I get the splunk index to read both from the same port?
I'm trying to create a timechart at intervals of one month however the below code produces the sum of the entire month, I want the value on the 1st of each month, please let me know any solutions to ... See more...
I'm trying to create a timechart at intervals of one month however the below code produces the sum of the entire month, I want the value on the 1st of each month, please let me know any solutions to get value any alternate to span to get intervals as on 2022-10-01 2022-09-01 2022-08-01 `source=all_month.csv place=*alaska* mag>=3.5 | timechart span=mon@mon1 count BY mag`    (index="sales") | fillnull value="undefined"| bucket _time span=mon@mon1 | chart count by _time stock
Hi all, I would like to create a table with details involved from two different index created. I'm facing difficulty in combining the data from both two indexes with common columns but different ev... See more...
Hi all, I would like to create a table with details involved from two different index created. I'm facing difficulty in combining the data from both two indexes with common columns but different event structure. How to start a query to merge/combine fields from different indexes? As mentioned, both indexes consist of one similar field which is user=john. Here are the details:   IndexA fieldA1=user (john) fieldA2=description   IndexB fieldB1=user (john) fieldB2=Workstation fieldB3=EventCode   Expected result: user| EventCode| description| Workstation john|      4740     |locked out| Lenovo..   could someone point me to the right direction on how to start a Splunk Cloud query to merge into one table? Many thanks.
I have the following search that shows the top 10 hosts by count of vulnerability categories: index=foo | stats count as Count by security_group_name, severity | chart useother=true first(Count) ov... See more...
I have the following search that shows the top 10 hosts by count of vulnerability categories: index=foo | stats count as Count by security_group_name, severity | chart useother=true first(Count) over security_group_name by severity | eval total=case(critical>0 AND high>0,critical+high,critical>0,critical,high>0,high,1==1,0) | eval subTotal=case(medium>0 AND low>0,medium+low,medium>0,medium,low>0,low,1==1,0) | sort 10 - subTotal,subSubTotal,total | fields - subTotal,subSubTotal,total | table "security_group_name",critical,high,medium,low This issue with my chart is that the results are not sorted by the overall total so I see the following results: How do I modify my search to sort by overall count/total? Thx