All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi to all. im setting an integration with Splunk and Splunk ES. I decided to send events via HEC method json format. I understand that in order to accept the events in Splunk ES i need to do 2 ... See more...
Hi to all. im setting an integration with Splunk and Splunk ES. I decided to send events via HEC method json format. I understand that in order to accept the events in Splunk ES i need to do 2 things. 1. build an Add on for parsing the info 2. load the data in data model. ill be happy to have several answers : 1. do i need to send the events via CEF Syslog or json format is good enough ? 2. what is the standard event we should send to Splunk? json, Syslog? CEF? ill be happy for you to explain the process for building an add on, how to load in data modal - CIM  thanks to all
The following event being parsed as single event. I'm trying to break the event into multiple events Sample data Timestamp: 2021.09.21 - 23:10:17.463 Message: c0d8758b-3fxy-44ca-aa65-hf180002d49... See more...
The following event being parsed as single event. I'm trying to break the event into multiple events Sample data Timestamp: 2021.09.21 - 23:10:17.463 Message: c0d8758b-3fxy-44ca-aa65-hf180002d499 Organization Name: bananaII UserId: systemuser AppTracking: abcd2400-34ac-50el-3456-4abcd7636 ------------------- CommonMessageInput ---------------- Timestamp: 2021.09.21 - 23:10:17.463 Message: c0d8758b-3fxy-44ca-aa65-hf180002d499 Organization Name: bananaII UserId: systemuser AppTracking: abcd2400-34ac-50el-3456-4abcd7636 ------------------- CommonMessageInput ---------------- Timestamp: 2021.09.21 - 23:10:17.463 Message: c0d8758b-3fxy-44ca-aa65-hf180002d499 Organization Name: bananaII UserId: systemuser AppTracking: abcd2400-34ac-50el-3456-4abcd7636 I'm trying to break the event before ------------------- CommonMessageInput ---------------- so the events will be  Event 1 Timestamp: 2021.09.21 - 23:10:17.463 Message: c0d8758b-3fxy-44ca-aa65-hf180002d499 Organization Name: bananaII UserId: systemuser AppTracking: abcd2400-34ac-50el-3456-4abcd7636 Event 2 ------------------- CommonMessageInput ---------------- Timestamp: 2021.09.21 - 23:10:17.463 Message: c0d8758b-3fxy-44ca-aa65-hf180002d499 Organization Name: bananaII UserId: systemuser AppTracking: abcd2400-34ac-50el-3456-4abcd7636 Event 3 ------------------- CommonMessageInput ---------------- Timestamp: 2021.09.21 - 23:10:17.463 Message: c0d8758b-3fxy-44ca-aa65-hf180002d499 Organization Name: bananaII UserId: systemuser AppTracking: abcd2400-34ac-50el-3456-4abcd7636  
Hello, Is it possible to create a form where users can update field values in Splunk?Does eval or replace conditions help? can someone help me with the process?   Thanks
I was expecting to find a helper object function for this, but I don't see one here: https://docs.splunk.com/Documentation/AddonBuilder/4.1.1/UserGuide/PythonHelperFunctions I want to use the DNS n... See more...
I was expecting to find a helper object function for this, but I don't see one here: https://docs.splunk.com/Documentation/AddonBuilder/4.1.1/UserGuide/PythonHelperFunctions I want to use the DNS name/URL of the search head in my alert action code.   How can this be accessed (Splunk cloud, if it matters)?    At least in my local test server,  I see this, but it returns an IP address, not a DNS name. helper.settings["server_uri"]
# How to get cookies for simulation or accessing UI port. # cval=`curl -c - -k http://splunk:8000 -L -o a 2>/dev/null|grep cval|tr -s " " " " | cut -d $'\t' -f 7` ab=`curl -c - -k http://splunk... See more...
# How to get cookies for simulation or accessing UI port. # cval=`curl -c - -k http://splunk:8000 -L -o a 2>/dev/null|grep cval|tr -s " " " " | cut -d $'\t' -f 7` ab=`curl -c - -k http://splunk:8000/en-US/account/login -H "Cookie: cval=$cval" -d "username=MYUSER&password=MYPASSWORD&cval=$cval" -o a 2>/dev/null |egrep "csrf|splunkd_8000" |perl -pe 's/\n/ /g' | perl -pe 's/\t/ /g'`   csrf_token=$(echo $ab |cut -d " " -f 7) splunkd_8000=$(echo $ab | cut -d " " -f 14) echo "splunkweb_csrf_token=$csrf_token" echo "splunkd_8000=$splunkd_8000"   # Once cookies ready, then fill headers for command #headers = { #Cookie: splunkd_8000=<splunkd_cookie>;splunkweb_csrf_token_8000=<csrf_token>, #Content-type: application/json, #X-Requested-With: XMLHttpRequest, #X-Splunk-Form-Key: <csrf_token> <<< csrf this appears for POST only.. #} # Example: curl -c - -k http://splunk:8000/en-US/splunkd/__raw/servicesNS/-/-/saved/searches/ -H "Cookie: cval=372560337;splunkweb_csrf_token_8000=1324774297983139238;splunkd_8000=xuqLdlcjgtNm77umvfv6WZvJnX^WbTGvi2f2XbBMhoHe3nsshq_rGa6_Rknw06XThwCvML2VLuyQhTuhJJsFyx8TRAHi7RC17Up56IkluUmQVCLj9R4uZl9OyNP9Z7qBhIr" -X GET -H "X-Splunk-Form-Key: 1324774297983139238" -H "X-Requested-With: XMLHttpRequest" -H "Content-type: application/json"
I have a dropdown whose value once input needs to be used in two different ways in the same search query. One of the indexes require that value to be as is but the other index requires the value to b... See more...
I have a dropdown whose value once input needs to be used in two different ways in the same search query. One of the indexes require that value to be as is but the other index requires the value to be altered.    I'm doing something like what ive mentioned below but that doesn't seem to be working. Any help is appreciated.     dropdown token value is selected_client with the initial value being "*" (index = indexA OR index = indexB) AND (clientForIndexA = domain1 OR clientForIndexB = domain2) | eval domain1 = if("$selected_client$" == "*", "*", "$selected_client$") | eval domain2 = if(domain1 == "*", "*", replace (sync_ml_domain, "\." , "-")) | eval domain2 = if(domain1 == "*", "*", replace (sync_ml_domain, "_" , "-"))    
I am trying to install Splunk on our 32bit Raspberry Pis. I was originally trying to install 9.0.1 and found out that it only runs on 64bit. I am currently using a 32-bit V7 Pi 4. So now I a trying t... See more...
I am trying to install Splunk on our 32bit Raspberry Pis. I was originally trying to install 9.0.1 and found out that it only runs on 64bit. I am currently using a 32-bit V7 Pi 4. So now I a trying to install 7.31. I am having issues finding the best documentation for installing. Could someone point me in the right direction? Thank you!
Does anyone have a document/steps to guide me to do a SIEM migration from Qradar to Splunk
Hi Team! Someone please explain to me what each parameter is responsible for in such a search tag: <search> <query>system="SWAP_total" host = crm.narsdade.com | bin _time span=1d | dedup _time... See more...
Hi Team! Someone please explain to me what each parameter is responsible for in such a search tag: <search> <query>system="SWAP_total" host = crm.narsdade.com | bin _time span=1d | dedup _time | eval requestLasts = requestLimit - requestCount | table requestCount, requestLasts | rename requestCount AS "Requests done", requestLasts AS "Requests to go" | transpose | eval foobar_slice = column + " (" + 'row 1'+")" | fields foobar_slice, "row 1"</query> <earliest>-24h@h</earliest> <latest>now</latest> <sampleRatio>1</sampleRatio> </search>   what is system..host.. and other attributes means for..
Hello, I've tried figuring this out on my own but I couldn't find any related threads which would fixed my problems. I'm trying to install Splunk enterprise on my Ubuntu 20.04.5 LTS Server as root.... See more...
Hello, I've tried figuring this out on my own but I couldn't find any related threads which would fixed my problems. I'm trying to install Splunk enterprise on my Ubuntu 20.04.5 LTS Server as root. I've tried both .deb and .tar versions by following the docs . I've also tried following the new installation manual video.   After starting splunk with ./splunk start  and accepting the license I was prompted to rename the default account, i continued with enter to use the default admin name. Then I changed the default password and waited for the RSA key gen and preliminary checks. After that I am prompted with:    Starting splunk server daemon (splunkd)... PYTHONHTTPSVERIFY is set to 0 in splunk-launch.conf disabling certificate validation for the httplib and urllib libraries shipped with the embedded Python interpreter; must be set to "1" for increased security Done Waiting for web server at http://127.0.0.1:8000 to be available........splunkd 4932 was not running. Stopping splunk helpers... Done. Stopped helpers. Removing stale pid file... done. WARNING: web interface does not seem to be available!   I've also checked the logs but could't figure out the problem on my own:   Last entries of cat /opt/splunk/var/log/splunk/splunkd.log  09-21-2022 19:55:57.924 +0200 INFO  PipelineComponent [4932 MainThread] - Pipeline vix disabled in default-mode.conf file 09-21-2022 19:55:57.932 +0200 WARN  IntrospectionGenerator:resource_usage [5097 ExecProcessor] -   SSLOptions - server.conf/[sslConfig]/sslVerifyServerCert is false disabling certificate validation; must be set to "true" for increased security 09-21-2022 19:55:57.942 +0200 WARN  Thread [4932 MainThread] - MainThread: about to throw a ThreadException: pthread_create: Resource temporarily unavailable; 55 threads active. Trying to create QueueServiceThread 09-21-2022 19:55:57.944 +0200 WARN  IntrospectionGenerator:resource_usage [5097 ExecProcessor] -   SSLCommon - PYTHONHTTPSVERIFY is set to 0 in splunk-launch.conf disabling certificate validation for the httplib and urllib libraries shipped with the embedded Python interpreter; must be set to "1" for increased security 09-21-2022 19:55:57.945 +0200 ERROR ExecProcessor [5097 ExecProcessor] - message from "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/splunk-dashboard-studio/bin/save_image_and_icon_on_install.py" /bin/sh: 1: Cannot fork 09-21-2022 19:55:57.945 +0200 ERROR ExecProcessor [5097 ExecProcessor] - Couldn't start command "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/splunk_assist/bin/selfupdate_modular_input.py": Resource temporarily unavailable 09-21-2022 19:55:57.948 +0200 WARN  IntrospectionGenerator:resource_usage [5097 ExecProcessor] -   SSLOptions - server.conf/[kvstore]/sslVerifyServerCert is false disabling certificate validation; must be set to "true" for increased security 09-21-2022 19:55:57.949 +0200 ERROR ExecProcessor [5097 ExecProcessor] - Couldn't start command "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/splunk_assist/bin/supervisor_modular_input.py": Resource temporarily unavailable 09-21-2022 19:55:57.952 +0200 WARN  IntrospectionGenerator:resource_usage [5097 ExecProcessor] -   Thread - MainThread: about to throw a ThreadException: pthread_create: Resource temporarily unavailable; 2 threads active. Trying to create KVStoreServerStatusInstrumentThread 09-21-2022 19:55:57.953 +0200 ERROR ExecProcessor [5097 ExecProcessor] - Couldn't start command "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/splunk_assist/bin/uiassets_modular_input.py": Resource temporarily unavailable 09-21-2022 19:55:57.954 +0200 ERROR ExecProcessor [5097 ExecProcessor] - Couldn't start command "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/splunk_instrumentation/bin/on_splunk_start.py": Resource temporarily unavailable 09-21-2022 19:55:57.954 +0200 ERROR ExecProcessor [5097 ExecProcessor] - Couldn't start command "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/splunk_monitoring_console/bin/dmc_config.py": Resource temporarily unavailable 09-21-2022 19:55:57.954 +0200 INFO  IntrospectionGenerator:resource_usage [5097 ExecProcessor] -  terminate called after throwing an instance of '15ThreadException' 09-21-2022 19:55:57.955 +0200 ERROR ExecProcessor [5097 ExecProcessor] - Couldn't start command "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/splunk_monitoring_console/bin/mc_auto_config.py": Resource temporarily unavailable 09-21-2022 19:55:57.956 +0200 ERROR ExecProcessor [5097 ExecProcessor] - Couldn't start command "/opt/splunk/bin/python3.7 /opt/splunk/etc/apps/splunk_secure_gateway/bin/ssg_enable_modular_input.py": Resource temporarily unavailable 09-21-2022 19:55:57.956 +0200 INFO  IntrospectionGenerator:resource_usage [5097 ExecProcessor] -    what():  MainThread: about to throw a ThreadException: pthread_create: Resource temporarily unavailable; 2 threads active. Trying to create KVStoreServerStatusInstrumentThread   ulimit -n -u open files                      (-n) 1024 max user processes              (-u) 62987   Does anyone know what I am doing wrong?   Please help me I have no spluck> : (
Hey Splunkers !! SPL-210107 Set Up Primary Data Source missing from data configuration side panel for Choropleth USA and Choropleth World Workaround: Add the data source via source... See more...
Hey Splunkers !! SPL-210107 Set Up Primary Data Source missing from data configuration side panel for Choropleth USA and Choropleth World Workaround: Add the data source via source code. Does this issue is fixed in 9.0.* versions.... This issue is available in Splunk 8.2.7 known issue document .. cant able to verify is this issue is fixed in version 9.0.* ...... check through the fixed issues document of 9.0.* version ... there is no sign that this issue is fixed or not ? So how could i verify does this issue is fixed in 9.0.* versions.... And if possible brief this issue with some sample SPL query and about the workaround for this issue... ------------------------------------ RestinLinux
I was installing the Linux AuditD app and the TA on my Splunk instance and my forwarders installed on RHEL 7 systems when I noticed that there's no inputs.conf file in either the app or the TA. How a... See more...
I was installing the Linux AuditD app and the TA on my Splunk instance and my forwarders installed on RHEL 7 systems when I noticed that there's no inputs.conf file in either the app or the TA. How are my indexers supposed to get and use any data from the systems without the forwarders sending the data over? Am I just supposed to make one myself? I had a look at the video guide for version v2 (something like 6 years ago), and that one seems to have an inputs.conf file, unlike the current version v3.
I want to exclude duration results if greater than 7 days. So i used search NOT but it is not working. Can someone help here? Query index=sentinelone | eval duration=tostring(now()-strptime(ins... See more...
I want to exclude duration results if greater than 7 days. So i used search NOT but it is not working. Can someone help here? Query index=sentinelone | eval duration=tostring(now()-strptime(installedAt,"%Y-%m-%dT%H:%M:%S.%6N"),"duration") | table _time installedAt agentDomain duration |search installedAt!="Null"    
I'm looking for a way to set a token when the column exists (regardless of value).   Tried these with no luck.  <eval token=if(isnotnull($row.MyCol$),useValue=$row.MyCol$,null())> <eval token=cas... See more...
I'm looking for a way to set a token when the column exists (regardless of value).   Tried these with no luck.  <eval token=if(isnotnull($row.MyCol$),useValue=$row.MyCol$,null())> <eval token=case($row.MyCol$ != &quot;&quot; , useValue=$row.MyCol$)  Thoughts? 
I have a query which results in a table: "some words" | stats dc(host) as host_count by zone, region My end goal is be able to create an alert if "host_count < 2" in any row. I will achie... See more...
I have a query which results in a table: "some words" | stats dc(host) as host_count by zone, region My end goal is be able to create an alert if "host_count < 2" in any row. I will achieve that by adding " | where host_count < 2" to the query and alerting if the search is non-empty.   The issue is that in some cases, when there are no lines matching the  "some words" criteria, I will have no row for that zone/region combination in my table. (i.e. I will never have a row where host_count is 0). This will result in a false negative for the alert. I had the thought that I could possibly merge the search result with a lookup table which provides the 0 value lines, but had no success. How can I achieve this?
Hello dear Splunk experts! I've stuck with one search and can't figure how to do this.  Did a lot of searching here on this friendly community but couldn't find the answer despite that saw a lot of... See more...
Hello dear Splunk experts! I've stuck with one search and can't figure how to do this.  Did a lot of searching here on this friendly community but couldn't find the answer despite that saw a lot of similar tasks with solutions. I have a dataset like this: sg1 sg1_approval sg2 sg2_approval sg3 sg3_approval value1 approved value2 not approved value3 delayed   And I want to get something like this: sg sg_value sg_approval sg1 value1 approved sg2 value2 not approved sg3 value3 delayed   What is the best way to achieve this? I've found some examples around transpose, eval or stats functions but these didn't solve my task completely. And to add a bit of complexity to this task - how to calculate sum of particular cells in rows with particular values of columns. I have this dataset: sg1 sg1_approval sg1_now sg2 sg2_approval sg2_now sg3 sg2_now sg3_approval value1 approved 4 value2 not approved 2 value3 5 delayed value2 not approved 3 value3 approved 5 value4 1 approved   And want to extract it as: sg_approval sg_now approved 10 not approved 5 delayed 5   So that sg_now column contains sum of all values in sg1_now, sg2_now and sg3_now sorted by sg1_approval, sg2_approval and sg3_approval. Thank you very much in advance! Regards
Dear Splunkers, really sorry for my question , I do feel that reply would be on another thread(couldn't find it), but i try to forward custom application access logs to  Splunk, giving specific tag... See more...
Dear Splunkers, really sorry for my question , I do feel that reply would be on another thread(couldn't find it), but i try to forward custom application access logs to  Splunk, giving specific tag-name to each column let's say(i would define it by regular expression), sending only "matching" data. I 've already set inputs.conf with the file path, index and sourcetype and successfully see full logs on Splunk search but whole info on event data . Still not sure where to set appropriate configuration(props.conf, tranform.conf, ?) for getting only Invoked Service, Caller IP and Response Code let's say since we are referring to Access Logs. 
I want no results of a search to display until the search has completed. The search I am running displays any users which do NOT have any logs found in the search. I also have an alert that triggers ... See more...
I want no results of a search to display until the search has completed. The search I am running displays any users which do NOT have any logs found in the search. I also have an alert that triggers when this search displays any results. The issue I am running into is that sometimes with long running queries, the results can sometimes briefly display results that a user that has not yet been found in the search and thus triggers an alert before the search finishes. The search finishes with the correct results, but the damage is done and the alert is already triggered.   I do not have the ability to modify the alert, just the search query.   The simplified search query: search string | eval tracked_users=split("userA,userB,userC",",") | stats values(user) as user by tracked_users | where NOT match(user,tracked_users) | table tracked_users | rename tracked_users as "Users not found"   Is  there a way to hide the table until the search is complete?  Or is there a better way to structure the query such that no results are displayed until the search is complete?
Hello Do field values have to be consistent for ES or doesn't it matter?  So in the wineventlog if src is sometimes the IP and other times the fqdn does ES care?  Same with the user field, if somet... See more...
Hello Do field values have to be consistent for ES or doesn't it matter?  So in the wineventlog if src is sometimes the IP and other times the fqdn does ES care?  Same with the user field, if sometimes the field value is bob@domain or domain-bob or bob$ does it matter? Thanks R00ster
Hi All, I have a large number of Windows logs in directory. How can I automatically delete them from the disk space after Splunk saves them and the folder size will be bigger than 5 gigabytes? Wher... See more...
Hi All, I have a large number of Windows logs in directory. How can I automatically delete them from the disk space after Splunk saves them and the folder size will be bigger than 5 gigabytes? Where can I write such configuration? Thanks in advance!