Hey, just a short advice:
There can be multiple deployment servers. You would however need to put them behind some kind of loadbalancer, and also make to sync their config, but besides that, it's possible.
I don't have time and enough knowledge to answer all your other questions, but I'll leave you an upvote, because you wrote a very precise and well done question, thanks!
... View more
Do I get this right?
You want to install Splunk UF with a certain service account, but without using that account's password?
Also, what is a MSA?
... View more
You can add the CMDB data as a lookup in Splunk, either as CSV, or via a DB lookup.
Besides that, your question is very broad and generic, so it's pretty hard to get any idea of what you have, what you want to do, and how it could be done.
Also,you might want to use the word "please" in future requests.
... View more
You CAN add the fields.conf on the HF, but it is only required for instances that are starting searches. So, unless your HF is used as a SH, no need for fields.conf there.
It is required on every search head!
... View more
By default it should be available on all IP addresses.
You can try netstat -tulpan | grep 8000 to see where Splunk is actually listening.
... View more
Hey,
I don't see any issues, besides the increasing disk space consumption.
You can, but it won't have the same (necessary) effect
You need to tell the other instances that a field with that name was extracted at index time. If you don't do that, you'll get strange behavior when trying to search with it.
... View more
Yeah, that is basically local admin, and should be fine, unless you did something really weird.
Did you set the path to those files in the input settings? Maybe on Windows you need to do something strange, like doubling the \ s, or replacing \ with / - nothing I can actually point you to, but all of those have happened to me in the past, so it's worth to give them a try.
... View more
So - you want to send the HEC data to two different destinations?
You sent ALL data from that instance to a certain index tier, by default, and for some data, want to also send that data to a second destination?
... View more
The timechart visualization should also show you the time range in which those events are, that might give you a hint what went wrong (e.g. wrong timestamp recognition = events in the future).
... View more
You could try this:
| tstats prestats=t count where sourcetype=waratek AND index=* by _time index
| timechart count by index
Set the search range to include events from 10 years ago until 10 years in the future, just in case some strange timestamp recognition happens.
... View more
Did you try to upload the Root CA certificate somewhere where Splunk has read permissions and then set this parameter in the input config?
Certificate Path
When a self-signed SSL certificate is used with the PCE, its SSL Certificate needs to be uploaded onto Splunk Server and the full path to directory containing the certificate should be provided here.
... View more
Could you show us a few lines of example data?
Although I'm pretty sure what you're trying to achieve will either be not possible or pretty complicated, but let's see.
... View more
Could you please show a broader example of your data (especially one event where multiple events are treated as one), and the props/transforms that relate to that sourcetype?
... View more
As an alternative - the answer from @richgalloway creates index-time extractions - this would be a working config for search-time extractions:
props.conf
[yoursourcetype]
REPORT-multifields = yoursourcetype-multifields
transforms.conf
[yoursourcetype-multifields]
REGEX = \s*([^:]+):(.*)[\r\n]
FORMAT = $1::$2
I shamelessly copied the regex from @somesoni2's comment 😉
Hope that helps - if it does I'd be happy if you would upvote/accept this answer, so others could profit from it. 🙂
... View more
Alternative option, via the Web GUI:
Settings -> Server controls
Hope that helps - if it does I'd be happy if you would upvote/accept this answer, so others could profit from it. 🙂
... View more
Do you have that information (City that user loggen in from) available in your data?
It would be a lot easier for us if you could post some example data. 🙂
... View more
Hey,
you're only missing a single char: s/^{//g 😉
Hope that helps - if it does I'd be happy if you would upvote/accept this answer, so others could profit from it. 🙂
... View more
Hey,
the best way to do this is the Splunk HTTP Event Collector. It's a HTTP(S) API, that you can send your events to.
There is a lot to be considered for this, but the documents explain it pretty well. Check this:
Set up and use HTTP Event Collector in Splunk Web
Introduction to Splunk HTTP Event Collector
Hope that helps - if it does I'd be happy if you would upvote/accept this answer, so others could profit from it. 🙂
... View more
That's a pretty useless error message. Please try using Chrome, visit the site, and when it shows you the security warning, press F12. It should open a window that will have a lot more details in it, like this:
... View more