All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi all, in <format type = "color"> can I also insert the row attribute? I need to color a table cell in the dashboard if the value of a row exceeds the target value. I tried with: <colorPalette ... See more...
Hi all, in <format type = "color"> can I also insert the row attribute? I need to color a table cell in the dashboard if the value of a row exceeds the target value. I tried with: <colorPalette type = "expression"> if (value & gt; 77, "# FA8072", "") </colorPalette> but color all the rows. My table: WO         September    October     November    December ..... A                     80                  77                       84                   46 B                    88                   23                      88                     26 C                    55                   34                      32                     93 I have the targets of A, B, C respectively : 60,70,80 they must color the row A: September, October, November B: September, november C: December Is it possible otherwise to insert a condition that affects the lines in the expression? Tks Greetings Antonio
I am working in clustered environment and getting data from HEC.  I want to list out indexes which are receiving HEC data and the data owners.
Was working on Splunk Enterprise SDK for Javascript and used the splunkjs.UI.Charting.Chart class to create a chart and embed it in the web page. But it throwed an error "cannot  access property of u... See more...
Was working on Splunk Enterprise SDK for Javascript and used the splunkjs.UI.Charting.Chart class to create a chart and embed it in the web page. But it throwed an error "cannot  access property of undefined; accessing Chart". Is there any way to solve it. Thanks in advance for the help. I have attached the error screenshots and the code block.  
Hi all, I am trying to feed results of a query into another of a different time and index and I'm facing issues with this. Context: I want to look for any user activity across my servers on d+1 for ... See more...
Hi all, I am trying to feed results of a query into another of a different time and index and I'm facing issues with this. Context: I want to look for any user activity across my servers on d+1 for list of user accounts which shows up as disabled on the active directory (windows event code=4725). From the search query below, I want to parse the list of usernames where count=1 and look for any user activity on d+1 onwards after earliest(_time) is recorded.  index=useractivitylogs [search index=wineventlog EventCode=4725 | eval timestamp=strftime(_time, "%Y-%m-%dT%H:%M"%S") | stats count as count, earliest(timestamp) by username | where count=1] Example: Eventcode 4725 is recorded for these 2 users based on my inner search: Timestamp | User: 5 September 2022 | Anna 10 September 2022 | Betty  Then, I want to feed these results to identify any user activity found on any servers on d+1 after the recorded Timestamp.   Thank you.   
Hello! I have the last months been working on automating adding/deleting new/old databases through a cmdb database.  It's working pretty well and maybe one day i hope to make it available for t... See more...
Hello! I have the last months been working on automating adding/deleting new/old databases through a cmdb database.  It's working pretty well and maybe one day i hope to make it available for the community.  But last week I ran into some trouble and I can not find any mentioning of this problem.  This project has a lot of oracle databases, somewhat 700 or so. And it turns out some of them contain an underscore (_) in the middle of their SID.  And i noticed that all of these fail to connect to the database.  It does not matter if it gets created from the automation app from the web UI, the error message is the same.  {"errors":[{"messageKey":"DATABASE_CONNECTION_INVALID_ERROR","args":{"name":"<HOSTNAME>"},"message":"Database connection <HOSTNAME> is invalid.","messageTemplate":"Database connection {name} is invalid.","detail":"Listener refused the connection with the following error:\nORA-12505, TNS:listener does not currently know of SID given in connect descriptor\n \r\n\r\nDiagnosis:\r\nIt seems like the provided database SID does not exist.\r\n\r\nPossible resolution:\r\nPlease provide the correct database SID"}]} So it would seem as the DB connect app does not like it when underscores are a part of the SID.  Has anyone else ran into this issue?
Hi everyone, I am new to splunk. I am looking at windows event logs for the EventCode=4725 for all usernames within a week's timeframe. What I want is to remove username results if there are more tha... See more...
Hi everyone, I am new to splunk. I am looking at windows event logs for the EventCode=4725 for all usernames within a week's timeframe. What I want is to remove username results if there are more than 1 count for this eventcode including that username, and then list in a table to show the timestamp and username when the eventcode occurred. Example: Usernames with EventCode=4725 recorded within 1 week:   Day 1 10pm : anna Day 1 11pm : betty Day 3 10pm : anna Day 3 1pm :  charlie Day 7 2pm : zach   Final result I want is: Day 1 11pm : betty Day 3 1pm :  charlie Day 7 2pm : zach From the above we have 'anna' removed completely from as her event showed up more than once.    This is my original query: index=wineventlog EventCode=4725 | fields * | eval timestamp=strftime(_time, "%Y-%m-%dT%H:%M"%S") | stats count by username | where username = 1 I then realised the problem with using stats count by,  because I wouldnt be able to show the timestamp for the results result this is in statistics.  I have thought of using dedup to remove duplicate values, but I have not found a way to remove duplicate values including that value itself. Please help. Thank you
I have an question/Issue with the use of rising option in DB Connect. I'm using Splunk Ent v 9.0x and DB connect 3.9.0 Im trying to understand how DB connect works with the rising option.  My issu... See more...
I have an question/Issue with the use of rising option in DB Connect. I'm using Splunk Ent v 9.0x and DB connect 3.9.0 Im trying to understand how DB connect works with the rising option.  My issue is that when i run it, the DB server is increasing the memory and swapping on the disk in order to return the results. The database im trying to read has more than100Million entries. What i did with the configuration of the connection was: 1. When i read the data from the DB to get the results  the server responds quickly. 2. When i add the           select * from DB where ID > ? ORDER By ID ASC         the server times out, so i increased the timeout value and i eventually got the option to add the ID number i wanted to track from and proceed to the next window. 3.  In the "MAX Rows to Retrieve" field i  added 50000 and left the Fetch Size default "300". Execution policy was every 10minutes. i was monitoring the server database and noticed that each request splunk db connect makes,  produces   issues on the server.   Looks like the "order by ID ASC"  makes the DB server to sort all the table, which increases the memory consumption and disk swapping. Returns ALL (i guess) the results and splunk ingests only 50.000 events as specified in the "max rows to retrieve" i checked also the queries splunk run on the DB side, and the query string didn't show any limit , for example  "SELECT * FROM  DB WHERE ID > ? order by ID ASC  Limit 50000; ID field is indexed. Is Splunk DB connect always asking the Database server to sort ALL the records ? How can i import the data, without making performance issue on the DB server?  Can i add the limit option in the config file for example ? EDIT: IDK if DB connect would work if i put at the end of the query in the db_inputs.conf <SELECT * FROM  DB WHERE ID > ? order by ID ASC  Limit 50000>. Any thoughts? Or i could create  batch jobs to slowly import data till today and then use the "default" rising string? The question here is if the ORDER  bY asc would still make performance issues to the DB server?      
Good afternoon! Please tell me, on the following request, unfortunately I'm not so familiar with spl to issue a working version now (( This request is required for notification. Let me describe th... See more...
Good afternoon! Please tell me, on the following request, unfortunately I'm not so familiar with spl to issue a working version now (( This request is required for notification. Let me describe the workflow first: We have a post thread, 12 posts. Each message has a unique routepointID field, the values ​​of this field begin with numbers and with each message in the chain, the value grows: 1.pointID, 2.pointID (this is an example). The notification should be processed if one of the messages came out out of order, for example: Received 1.pointID, 2.pointID waiting for 3.pointID, and comes: 4.pointID need to run an alert. An example of our query to find message threads from a message flow: index="main" sourcetype="testsystem-script4" | eval srcMsgId_Исх_Сообщения=if(len('Correlation_srcMsgId')==0 OR isnull('Correlation_srcMsgId'),'srcMsgId','Correlation_srcMsgId') | eval timeValue='eventTime' | eval time=strptime(timeValue,"%Y-%m-%dT%H:%M:%S.%3N%Z") | sort -eventTime | streamstats values(time) current=f  window=1 as STERAM_RESULT  global=false by srcMsgId_Исх_Сообщения | eval diff=STERAM_RESULT-time | stats list(diff)  as TIME_DIF list(eventTime) as eventTime list(srcMsgId) as srcMsgId_Бизнес_Сообщения list(routepointID) as routepointID count as  Кол_Сообщений by srcMsgId_Исх_Сообщения
Hello, I'm using a timechart with the following block for allowing the user to select a specific area and see stats on it.     <selection> <set token="TOKEN_TIME_selection.e... See more...
Hello, I'm using a timechart with the following block for allowing the user to select a specific area and see stats on it.     <selection> <set token="TOKEN_TIME_selection.earliest">$start$</set> <set token="TOKEN_TIME_selection.latest">$end$</set> </selection>     However, the chart has an area of interest that I can detect and that I want to be selected by default. I still want to show the whole chart (so I can't to use <earliest> and <latest>), but it would be nice to show it with the area of interest already selected by default, and therefore showing stats for that. To clarify what I mean, this is what I would like to show by default: I can't find anything in the documentation to define the <selection> area in-code, so I would like to know if there is any way to do it. Thank you!
hi All, HF's OS was recently migrated to RHEL from centos. Since then HF's are not sending any input data to splunk. though i can see internal logs.: I can see in internal logs error : Cooked c... See more...
hi All, HF's OS was recently migrated to RHEL from centos. Since then HF's are not sending any input data to splunk. though i can see internal logs.: I can see in internal logs error : Cooked connection to ip= <indexer ip> timed out  other error i can see is : message from "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/splunk_assist/bin/uiassets_modular_input.py" splunk.AuthenticationFailed: [HTTP 401] Client is not authenticated. need help as almost 9 forwarders are not reporting right now.  
Team, We have recently migrated our Splunk Apps from old server to new CDP server.  AND Old server is going to decommission very soon. Our Splunk NFR License is deployed in old server. So: 1. C... See more...
Team, We have recently migrated our Splunk Apps from old server to new CDP server.  AND Old server is going to decommission very soon. Our Splunk NFR License is deployed in old server. So: 1. Can I use same Splunk NFR license key in new server? 2. If not, what are the possible solution to use the same License in new CDP environment  Can you please suggest and guide. Thanks Dinesh
What is the time interval for predictive health score calculation cycle? Is it possible to set the predictive health score calculation cycle to 1-minute intervals?
Hi There,   Is it possible to forward logs from azure private cloud to splunk cloud using "Microsoft cloud services add-on"   Thanks in advance
Hi I tried following steps from below github to get Kubernetes metrics https://github.com/signalfx/splunk-otel-collector-chart   Here is the code I used and I am getting logs in main index k8... See more...
Hi I tried following steps from below github to get Kubernetes metrics https://github.com/signalfx/splunk-otel-collector-chart   Here is the code I used and I am getting logs in main index k8main , but no data in metrics index k8metrics. helm install my-splunk-otel-collector --set="splunkPlatform.endpoint=XXXXX, splunkPlatform.token=YYYYY, splunkPlatform.index=k8main, splunkPlatform.metricsEnabled=true, splunkPlatform.metricsIndex=k8metrics, splunkPlatform.insecureSkipVerify=true, clusterName=splunk-cluster" splunk-otel-collector-chart/splunk-otel-collector   Here is the error i am getting error exporterhelper/queued_retry.go:395 Exporting failed. The error is not retryable. Dropping data. {"kind": "exporter", "data_type": "metrics", "name": "splunk_hec/platform_metrics", "error": "Permanent error: \"HTTP/1.1 400 Bad Request\\r\\nContent-Length: 60\\r\\nConnection: Keep-Alive\\r\\nContent-Type: application/json; charset=UTF-8\\r\\nDate: Fri, 30 Sep 2022 14:44:09 GMT\\r\\nServer: Splunkd\\r\\nVary: Authorization\\r\\nX-Content-Type-Options: nosniff\\r\\nX-Frame-Options: SAMEORIGIN\\r\\n\\r\\n{\\\"text\\\":\\\"Incorrect index\\\",\\\"code\\\":7,\\\"invalid-event-number\\\":1}\"", "dropped_items": 27} Can someone please advice on how to get metrics in the above scenario. Thank You.
I appear to be getting no data from the distinct windows performance app v1.2.0 running on Splunk 9. I have attached a screenshot of the app in question.  
Hello, I would like to extract the 10 milliseconds in the below snippet of text as a separate value in a field. Is there anyway to do this? Thank you!! 2022-10-02T12:56:40.073Z [BillingExecu... See more...
Hello, I would like to extract the 10 milliseconds in the below snippet of text as a separate value in a field. Is there anyway to do this? Thank you!! 2022-10-02T12:56:40.073Z [BillingExecutors-4] INFO com...els.kafka.ElsKafkaReceiver - Message processing time at event aggregator in milli seconds 10 2022-10-02T12:56:40.073Z [BillingExecutors-4] INFO com...els.kafka.ElsKafkaReceiver - Message processing time at event aggregator in milli seconds 10
So today i installed the forwarder on a DC that is hosted on a VM but i cant seem to get any logs from this machine  i've already enabled Splunk to listen on  9997  for receiving  I'm also using the ... See more...
So today i installed the forwarder on a DC that is hosted on a VM but i cant seem to get any logs from this machine  i've already enabled Splunk to listen on  9997  for receiving  I'm also using the Splunk for windows addon and enabled all the logs from the config file (after copying it to the local directory) and the Splunk instance is hosted on the host machine and I've already setup the networking between the host and the VM i basically followed this  Guide   but i still can't get to forward the events , am i missing any steps here? , i also confirmed that the indexer was set correctly from the outputs file i was able to input data from the local host without an issue before if that helps
Hi guys, I am quite new to the Splunk world, pls forgive me for asking a very basic question.   So I have a table as following: job_id     total_passed        total_failed      total_not_run ... See more...
Hi guys, I am quite new to the Splunk world, pls forgive me for asking a very basic question.   So I have a table as following: job_id     total_passed        total_failed      total_not_run 9                14                            20                         6 10              25                            31                        9 and so on. I want to create a pie chart for different job_ids (lets say 9), with total_passed, total_failed, total_not_run values (14, 20, 6) and total_passed, total_failed, total_not_run as the headers of the chart in Splunk dashboard. how to do it? any help will be deeply appreciated.  
Hi Team, I have below queries in my dashboard Panel1: index="abc" sourcetype="abc" $reg$ |lookup local=t Org_Alias.csv OrgFolderName OUTPUT OrgName| search OrgName=$OrgName$ | rename OrgName as... See more...
Hi Team, I have below queries in my dashboard Panel1: index="abc" sourcetype="abc" $reg$ |lookup local=t Org_Alias.csv OrgFolderName OUTPUT OrgName| search OrgName=$OrgName$ | rename OrgName as "Salesforce Org Name" | chart latest(NumberOfActiveUsersNotLoggedInForMoreThan15Days) as "# Active Users NOT logged in &gt; 15 days" latest(NumberOfActiveUsersNotLoggedInForMoreThan30Days) as "# Active Users NOT logged in &gt; 30 days" latest(NumberOfActiveUsersNotLoggedInForMoreThan60Days) as "# Active Users NOT logged in &gt; 60 days" latest(NumberOfActiveUsersNotLoggedInForMoreThan90Days) as "# Active Users NOT logged in &gt; 90 days" by "Salesforce Org Name"   Panel2: index="abc" sourcetype="abc" $reg$ |lookup local=t Org_Alias.csv OrgFolderName OUTPUT OrgName| search OrgName=$OrgName$ | chart latest(NumberOfActiveUsers) as "Number Of ActiveUsers" latest(SalesforceOrgId) as "Salesforce Org Id" latest(NumberOfActiveUsersNotLoggedInForMoreThan15Days) as "Number Of ActiveUsers Not Logged In For MoreThan 15Days" latest(NumberOfActiveUsersNotLoggedInForMoreThan30Days) as "Number Of ActiveUsers Not Logged In For MoreThan 30Days" latest(NumberOfActiveUsersNotLoggedInForMoreThan60Days) as "Number Of ActiveUsers Not Logged In For MoreThan 60Days" latest(NumberOfActiveUsersNotLoggedInForMoreThan90Days) as "Number Of ActiveUsers Not Logged In For MoreThan 90Days" by OrgName panel3: index="abc" sourcetype="abc" InactiveForMoreThan90Days !="No" $reg$ $type$ |lookup local=t Org_Alias.csv OrgFolderName OUTPUT OrgName| search OrgName=$OrgName$ | dedup _raw |stats count(InactiveForMoreThan90Days) as "Total Inactive Users" by OrgName panel4 index="abc" sourcetype="abc" InactiveForMoreThan90Days !="No" $reg$ $type$ |lookup local=t Org_Alias.csv OrgFolderName OUTPUT OrgName|search OrgName=$selected_value4$ | dedup _raw | stats values(OrgName) as "Org" by Name Email UserId UserName LicenseName LastLoginDateTime I have made my base search as this: index="abc" sourcetype="abc" $reg$ |lookup local=t Org_Alias.csv OrgFolderName OUTPUT OrgName| search OrgName=$OrgName$|rename OrgName as "Salesforce Org Name" But its not working can someone guide me here.  
Hi  Hope you are doing good.. I'm having a small query I want to check my license warning on my splunk with date I.e. On 26th of September we received 1 license warning. I'm using the below que... See more...
Hi  Hope you are doing good.. I'm having a small query I want to check my license warning on my splunk with date I.e. On 26th of September we received 1 license warning. I'm using the below query to get the total license warming I have on my splunk till now  | rest splunk_server=local /services/licenser/slaves | mvexpand active_pool_ids | where warning_count>0 | eval pool=active_pool_ids | join type=outer pool [rest splunk_server=local /services/licenser/pools | eval pool=title | fields pool stack_id] | eval in_violation=if(warning_count>4 OR (warning_count>2 AND stack_id=="free"),"yes","no") | fields label, title, pool, warning_count, in_violation | fields - _timediff | rename label as "Slave" title as "GUID" pool as "Pool" warning_count as "Hard Warnings" in_violation AS "In Violation?" Kindly guide me how can I get the license warning with date.   Thanks