Hi all, I have a table and I need to highlight the values that are greater than lets say 5 in a line graph. how to select only those specific values into search
I'm getting what I believe are strange results when using the round function to control the number of decimal places. This is a search that I have in a dashboard to calculate how much data (in GB) t...
Hello I have the following fields on EventCode=4625 (failed login events), Fields: _time, Source_Network_Address,Account_Name, Workstation Name,EventCode And i want to create anomaly creation ...
Hi,
We have an integration setup for ThreatStream Anomali app and Splunk ES. This was done previously from someone else. At the moment, I see million events coming in. But I want to fine tune t...
...ee this AAR getting applied to anomalies that have IP address which are listed in watchlist. Can anyone please suggest what could the reason behind it and how can I resolve it. Thanks!
Hi,
Can anyone explain the difference between anomalies and anomalousvalue? From the search reference, it looks like anomalies operates on a single field and is context-sensitive (i.e. looks at t...
Hi,
I have started to learning machine learning concepts and trying to imply on Splunk tool. So, i tried to use anomaly and anomalydetection search commands but i couldn't understand how these com...
Assume i have daily records about an amount of keys.
What would be the search to trigger an alert condition if changes are seen by say +/- 10% ?
Sample records, the best case case would be if t...
Hi all, I am new to Splunk and have been trying to work on a use case to detect anomalous switches from one type of account to another. Index A: Has the list of switches i.e. has two columns: 'Old ...