answer by @vskoryk_splunk
.. | stats latest(version) latest(_time) by user
http://docs.splunk.com/Documentation/Splunk/6.1/SearchReference/Commonstatsfunctions
... View more
If magnitude is a field, which I assume it is, just include in your search magnitude > 2.
As for the event "just prior" - is there any extrapolation, in terms of time of event, that you can make?
... View more
KV_MODE is too useful to turn off for this case.
Because lookups are executed after field aliases, you can alias your existing action field to some other name (like vendor_action) and then overwrite it with your lookup. This way you get both.
... View more
unfortunately this add-on currently does not support syslog setup. its in our plans.
if you have Enterprise Security, it comes bundled with an add-on for SEP which supports syslog.
... View more
The issue here is the fact that the 2 samples do not follow the same format. Things are breaking down at the category field extraction (because category is the first field enclosed in quotes, which requires a different capture than the rest of the fields). The extraction expects it to be the 9th field and it is in the 13th place in the broken message (we are splitting the fields by spaces).
... View more
then try this
sourcetype="F5:iRule:WebAccess" NOT uat. cipher=TLSv1 | stats dc(client_ip) as distinctCount values(client_ip) | where distinctCount>1 | lookup dnsLookup ip AS client_ip OUTPUTNEW hostname
... View more
of course the field name mattes.
try
sourcetype="F5:iRule:WebAccess" NOT uat. cipher=TLSv1 | stats dc(client_ip) as distinctCount values(client_ip) | where distinctCount>1 | lookup dnsLookup ip AS client_ip OUTPUTNEW host AS hostname
(hopefully hostname is a field that exists for you)
... View more
Here is the breakdown: https://answers.splunk.com/answers/8051/dns-lookup-via-splunk.html
reminder: please search first, before creating a duplicate question.
... View more
The best practice for cases like this is setting up syslog aggregation like syslog-ng, forward your logs to that and install the UF on the syslog-ng server.
... View more
There is not enough information here to answer your question. Install instructions for what? Trust scores where - ES? If so, how was your ES configured? Which data sources do you have?
... View more
Splunk uses CRC for monitoring files: http://docs.splunk.com/Documentation/Splunk/6.0.5/Data/Howlogfilerotationishandled
so disabling atime should not cause any problems.
... View more
ok, if you only have one server and one forwarder, it means that your search head is also your indexer, so any sort of interaction with the indexes happens on your server.
under access controls -> roles, make sure that index is selected under "Indexes searched by default".
if that still does not fix it, you should remove the definition of that index from your app's indexes.conf and restart.
... View more
Pete,
The number of variables is growing with every message.
Can you enable the old app before going to configure the new app?
Can you ensure that new TA has global permissions?
If none of this helped, how about this:
Remove the old and new TAs and Apps and run through the install again.
Once you do and if the problem is still there, we have a couple of options:
- open a support case and send us a diag
- if you don't have an enterprise license, just send us a diag
- a screenshot of the problem would be useful as well
... View more