Activity Feed
- Posted Re: props and transforms to extract multiline muntivalue event on Splunk Search. 02-06-2023 11:48 PM
- Posted How can I use props and transforms to extract multiline muntivalue event? on Splunk Search. 02-06-2023 11:26 PM
- Tagged How can I use props and transforms to extract multiline muntivalue event? on Splunk Search. 02-06-2023 11:26 PM
- Tagged How can I use props and transforms to extract multiline muntivalue event? on Splunk Search. 02-06-2023 11:26 PM
- Posted Re: Stuck with Splunk ES Upgrade on Splunk Enterprise Security. 05-01-2022 08:00 PM
- Posted Stuck with Splunk ES Upgrade on Splunk Enterprise Security. 04-27-2022 08:42 PM
- Posted Re: Splunk Apps throwing Invalid key python3 warnings on All Apps and Add-ons. 03-03-2022 03:17 PM
- Posted Re: Splunk Apps throwing Invalid key python3 warnings on All Apps and Add-ons. 03-03-2022 03:13 PM
- Posted Splunk Apps throwing Invalid key python3 warnings on All Apps and Add-ons. 03-02-2022 07:16 PM
- Posted Re: eval not working in props.conf on Getting Data In. 02-15-2022 08:48 PM
- Posted Re: eval not working in props.conf on Getting Data In. 01-26-2022 03:25 PM
- Posted Re: eval not working in props.conf on Getting Data In. 01-26-2022 03:24 PM
- Posted Why does eval search work but eval in the props conf file doesn't creating new field? on Getting Data In. 01-24-2022 07:18 PM
- Posted Re: Search Time extraction not working on Splunk Enterprise. 12-09-2021 03:01 PM
- Karma Re: Search Time extraction not working for isoutamo. 12-09-2021 03:00 PM
- Posted Re: Search Time extraction not working on Splunk Enterprise. 12-09-2021 02:18 PM
- Posted Search Time extraction not working on Splunk Enterprise. 12-08-2021 04:52 PM
- Got Karma for Re: How to configure a sourcetype for JSON data to parse each line as a distinct event?. 01-28-2021 03:55 PM
- Posted Data Anonimization - Multiple transforms not working for single _raw event on Getting Data In. 09-17-2020 12:23 AM
- Posted Re: JSON payloads not getting indexed into Splunk on Getting Data In. 08-24-2020 06:54 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
04-11-2019
06:01 AM
Hi @niketnilay
You are right. My default condition is never hit. I tried to display the values in my dashboard. Result is shown below
1st Condition value is 20190411 and default condition value is $selectedTokenValue1$ and Today is 20190411
My default condition should pick the value if it is same as $todate$. But it is not hitting as it is read by my 1st condition. How can I avoid this in condition 1?
... View more
04-10-2019
06:50 PM
New updates:
I am able to make it work. But new problem. Only first condition works. 2nd condition is not working.
<condition match="$value$!="$todate$"">
<unset token="selected_T_query"></unset>
<set token="selected_T_query">
| inputlookup lookup.csv | search Day=$selected_date$ | stats count by TRAN_CAT
</set>
</condition >
<condition >
<unset token="selected_T_query"></unset>
<set token="selected_T_query">
| savedsearch 00Dashboard_All_Lookup | stats count by TRAN_CAT
</set>
</condition >
</change>
... View more
04-10-2019
05:40 PM
Hi @paramagurukarthikeyan
It's a nice idea to write queries during the condition matches. But my Today is not a static value. Below is my code snippet. Somehow my condition is not able to give me results when I use $todate$. I hope it's a minor tweak. Need help please.
Below I am setting token $todate$ to today's value
<query>| makeresults|eval today=strftime(_time,"%Y-%m-%d")|fields - _time</query>
<done>
<set token="todate">$result.today$</set>
</done>
And using it in below code snippet. My default value is
<input type="dropdown" token="selected_date" searchWhenChanged="true">
<label>Select a Date</label>
<default>$todate$</default>
.
.
.
.
| inputlookup lookup.csv | search Day=$selected_date$ | stats count by TRAN_CAT
... View more
04-10-2019
12:02 AM
Hello experts,
I have 2 dropdowns in my dashboard.
1st - Last 7 days (including TODAY)
2nd - If I select TODAY in 1st, I need to write a search query on an index to populate values in this dropdown.
If I select any other day, I need to search inputlookup csv file which gets generated everyday at 00:02 (having all the values of last 6 days).
How can I put this if-else condition to populate 2nd dropdown?
Thanks,
Naresh
... View more
- Tags:
- splunk-enterprise
03-27-2019
05:29 PM
Thanks for clarifying Mate @harsmarvania57
... View more
03-26-2019
08:14 PM
It worked when I redirected to a different sourcetype turning on the SHOULD_LINEMERGE . Thanks
... View more
03-26-2019
07:03 PM
Hello Experts,
I am setting up new clustered environment with below setup. Need advice on recommended configurations.
Indexer cluster - 2 sites - 1 server each site
Search head cluster - 2 sites - 1 server on 1st site ,2 servers on second site.
cluster master/deployer - 1 server on 1st site
My current configurations based on my readings through splunk docs below.
On indexer cluster master
[clustering]
site_replication_factor = origin:1,site1:1,site2:1,total:2
site_search_factor = origin:1,total:2
replication_factor = 2
On search head members:
[shclustering]
replication_factor = 2
When one of the indexer is stopped, my indexer cluster says "Search Factor is not Met" and "Replication Factor is not Met". Will there be any consequences with this? Any recommended changes to make it a stable set-up?
Also, How can I tell any forwarder (which is sending data to indexer1) to send data to indexer2 if indexer1 goes down?
Thanks,
Naresh
... View more
- Tags:
- splunk-enterprise
03-17-2019
05:13 PM
Hello Experts,
I am indexing data from a shared file. I have below config in my props.conf. Some of the lines from my inout log file doesn't have timestamp. So, All those events are getting timestamp from previous events read by Splunk.
Using this config, I am getting irregular timestamps captured. Any advice to fix this is much appreciated.
[Custom_W22]
DATETIME_CONFIG =
NO_BINARY_CHECK = true
SHOULD_LINEMERGE = false
TIME_FORMAT = %Y-%m-%d_%H:%M:%S.%3N
TIME_PREFIX = ^
TRANSFORMS-set = discardAll,queue2resp,index2resp
category = Custom
disabled = false
pulldown_type = 1
Example from log:
2019-02-20_03:30:02.333 - Line-1
2019-02-20_03:30:02.349 - Line-2
2019-02-20_03:30:02.364 - Line-3
2019-02-20_03:30:02.380 - Line-4
- Line-5
2019-02-20_03:30:02.427 - Line-6
Expected Output: Line-5 should have the timestamp of either Line-6 or Line-4. But it is going out of these bounds and showing different timestamps for few lines. Any help please?
... View more
03-17-2019
04:41 PM
Hi @whrg,
I am indexing data from a remote shared file. Not using any forwarder. I am getting below error after restarting post changes.As per my request, I also need to extract other lines from my log which doesn't have this pattern.
Invalid key in stanza [monitor://\\data$] in D:\Program Files\Splunk\etc\system\local\inputs.conf, line 23: SEDCMD-remove_header (value: (s/].*/]/g)).
... View more
03-14-2019
08:13 PM
@renjith.nair - Any further help is much appreciated. Looking for the conditional search on dropdown values rather than the search results.
... View more
03-14-2019
08:12 PM
@vnravikumar - Any further help is much appreciated.
... View more
03-14-2019
06:47 PM
@whrg - yes, I need it at index-time. I somehow tried to copy the SED solution (to replace everything after ] with a ] ) from another blog. But i am still not getting the desired result.
Any tweaks to this SED code to make it work?
SEDCMD-remove_header = s/^]/].*?/g
... View more
03-12-2019
09:37 PM
Hi Experts,
I want to filter for a line with a string. But display only first n characters. Note: My input has other lines with a different patterns which should be displayed in full (3rd line in below example)
Regex tried: (?:^.{0,55})(search_me)
test lines from log:
2019-02-20_14:51:27.041 [https-openssl-apr-443-exec-51] DEBUG search_me
2019-02-20_14:55:27.041 [https-openssl-apr-443-exec-51] DEBUG search_me
,responseTime="30secs"
2019-02-20_14:57:27.041 [https-openssl-apr-443-exec-51] DEBUG search_me
Output needed:
2019-02-20_14:51:27.041 [https-openssl-apr-443-exec-51]
2019-02-20_14:55:27.041 [https-openssl-apr-443-exec-51]
,responseTime="30secs"
2019-02-20_14:57:27.041 [https-openssl-apr-443-exec-51]
... View more
- Tags:
- splunk-enterprise
03-07-2019
09:51 PM
Awesome @renjith.nair . It works. Is there alternate way to drive this using the dropdown values rather than the search query values?
Also you mentioned about depends and rejects. How to use that approach?
... View more
03-07-2019
09:34 PM
@vnravikumar - I wanted different searches for different set of Dropdowns actually.
... View more
03-07-2019
08:59 PM
Hi @renjith.nair ,
No Luck. I am getting the same result even after changing the condition as you mentioned.
Thanks,
Naresh
... View more
03-07-2019
05:50 PM
Hello experts,
I am trying to dynamically change my dashboard view based on 3 dropdown inputs. All the time, my show_tab1 results are hidden even if the condition matches. Any help to tweak the code is appreciated.
<row>
<panel>
<table depends="$hide_table$">
<search>
<query> | from datamodel:"0DP_T_common" | search C_Category=$selected_cat$ C_endpoint="$selected_endpoint$" C_Response=$selected_response$ | table C_Day C_StartTime C_Category C_endpoint C_Response duration</query>
<earliest>0</earliest>
<sampleRatio>1</sampleRatio>
<done>
<condition match="$result.selected_cat$=Categ_1 AND $result.selected_endpoint$=prime AND $result.selected_response$=00">
<unset token="hide_table"></unset>
<set token="show_tab1">true</set>
</condition>
<condition>
<set token="hide_table">true</set>
<unset token="show_tab1"></unset>
</condition>
</done>
</search>
</table>
<table depends="$show_tab1$">
<search>
<query> | from datamodel:"0DP_T_selected" | search C_Category=$selected_cat$ C_endpoint="$selected_endpoint$" C_Response=$selected_response$ | table C_Day C_StartTime C_Category C_endpoint C_Response duration</query>
<earliest>0</earliest>
<sampleRatio>1</sampleRatio>
</search>
</table>
</panel>
... View more
- Tags:
- splunk-enterprise
02-25-2019
03:55 PM
Just Awesome. I should have asked this before scratching my head for half a day and trying multiple options with transforms.conf and eventually failing.
Thanks Frank
... View more
02-24-2019
08:34 PM
Hello experts,
Need help. My requirement is to extract 1st set of lines into 1st index and 2nd set into 2nd index. And ignore all other lines from a log file.
Below is my configuration which is obviously failing.
I have seen other blogs' solution - successfully able to separate events into two indexes without using [discardAll] from transforms.conf and unspecified index in inputs.conf. But it will redirect all my ignored lines into main idx which I don't want.
inputs.conf
[monitor://D:\splunk_test\target.log]
disabled = false
sourcetype = Custom_S
index = target_index_one
interval = 10
crcSalt =
props.conf
[Custom_S]
TRANSFORMS-set = discardAll,index2one,index2two
transforms.conf
[discardAll]
REGEX=.
DEST_KEY=queue
FORMAT=nullQueue
[index2one]
REGEX=(First_Filter)
DEST_KEY=_MetaData:Index
FORMAT=target_index_one
[index2two]
REGEX=(Second_Variant)
DEST_KEY=_MetaData:Index
FORMAT=target_index_two
... View more
01-20-2019
07:30 PM
Hi Renjith - Got into inconsistent timed data issues. My output of _time does not match with the actual transaction time.
Is there a way to define StartTime and EndTime using a custom time extracted from _raw ?
Thanks,
Naresh
... View more
01-15-2019
05:25 PM
What is the version of your Splunk?
I am using 7.1.1 and when I manually upload the file, there is an option to break the events at every line. This happens at the "Set Source Type" page.
Give a try.
... View more
01-10-2019
09:54 PM
Check out below thread. I had similar query resolved using transaction command
https://answers.splunk.com/answers/714361/how-do-you-group-start-and-end-times-from-a-set-of.html
... View more
01-10-2019
02:26 PM
Yes Renjith - My question is about Heavy Forwarder vs Universal Forwarder with the help of props.conf and transforms.conf.
... View more
01-09-2019
10:12 PM
Worked perfect. Absolute Genius you are @renjith.nair
Can you throw some light on which one to use between UF and HF for this scenario? Some of the splunk pages say HF uses more resources. So, I didn't opt that for my previous use cases.
Since this looked complex when I started the work, thought of using HF. But you made it a smooch cake cut with just a single query.
If HF yields better results performance wise, can you please help me settingup my props.conf and transforms.conf for this example? Any other confs to be edited? Hope, All these conf changes should happen on the Indexer end - where the data is being sent to?
Thanks,
Naresh
... View more
01-09-2019
07:16 PM
And may be can we ask the query to check until the status is End in below query?
eval sno=if(Identifier==_prev,0,1)
... View more
- « Previous
- Next »