Hi,
verify that the splunk run user have the permission to read wmi data. If the splunk run user is not a domain admin you must verify that it has the permission to gather wmi information.
for additional information read the docs.
http://docs.splunk.com/Documentation/Splunk/6.5.0/Data/MonitorWindowseventlogdata
kind regards
... View more
Add this to the sourcetype stanza in props.conf
EXTRACT-bpc = \<BusinessPartnerCode\>(?<BusinessPartnerCode>\d{6})\<\/BusinessPartnerCode\>
Or you take the way above for extraction during the search.
... View more
Ok thats the reason why.
you defined the parameter sourcetype with values that are not known by the splunk app for *nix.
The searches are based on sourcetypes.
Take the inputs.conf provided with the Splunk_TA_nix and configure it on your ufs.
After this you have the correct sourcetypes defined the Splunk App for *nix will show results.
kind regards
... View more
Hi jeremeek,
just check out this.
http://docs.splunk.com/Documentation/DBX/2.3.1/DeployDBX/Createandmanagedatabaseinputs#Advanced
regards
... View more
Hi, yes its a little much to explain everything here 😉 But simply have a look at the documentation. Its pretty straight forward.
http://docs.splunk.com/Documentation/AddOns/released/NetFlow/Configureinputs
There you will find everything you need to know to configure the add-on.
kind regards
... View more
Your query i fine. The problem is that there are no events before today.
You specified index=<> host=<>. Probably the host was added to your splunk environment today? Or you create the index today?
The only thing i can tell you is... You have no data in your Splunk environment matchting the SPL-query.
index=<> host=<>
until today. 🙂
... View more
Hi,
try to put in the pass4SymmKey in cleartext to all Splunk instances again. (SH,CM,IDX,LicenseMaster) and restart splunkd. There must be a discrepancy.
What Versions are your Splunk Instances running?
kind regards
... View more
Hey Binay,
are you sure that you have events in the specified timerange? By setting Last 7, Last 30, Last 4 hours etc.. you automatically get events from today.
It looks like there are simply no events.
Whats the first event displayed by setting last 7 days with the following search string?
index=<> host=<> | sort _time
... View more
Hi,
im imported your test data with your given sourcetype. Works quite fine. All fields are extracted and there are no problems with searching.
Do you have a distributed environment? Make sure your Forwarders Input Stanzas are configured with the above sourcetype. Make sure the props.conf is available on your indexers.
kind regards
... View more
Hi,
yes you can do this.
You need to create two output.conf stanzas
[tcpout:south]
server=server_south:9997
[tcpout:east]
server=server_east:9997
Then you need to do a TCP_routing in inputs.conf
[monitor://path/myapp1.log]
_TCP_ROUTING = south
[monitor://path/myapp3.log]
_TCP_ROUTING = east
Hope this helps. You have to create a input stanza for each log in this example. But can also do the matching via Regex to reduce the amount of input stanzas.
kind regards
... View more
Hi,
the splunkd.log on your indexers should be indexed automatically. You can find them by searching index=_internal. There you will find all internal splunk logdata.
For getting the internal logs of your searchhead to the indexer tier look at this. This works similar for your master node.
http://docs.splunk.com/Documentation/Splunk/latest/DistSearch/Forwardsearchheaddata
kind regards
... View more
Oh sorry, i did not know that you have to purchase it. But i looked at the site of unityjdbc. Theres seems to be a free trial version of the driver.
http://www.unityjdbc.com/download.php?type=mongodb
Hope this will help you.
... View more
Hi,
the Add-on you searching for is Splunk DBConnect v2. It gives you the possibility to import/export database information. By default there is no support for MongoDB.
But there seems to be a solution.
Follow this link.
https://answers.splunk.com/answers/418125/splunk-db-connect-2-what-is-the-serviceclass-for-m.html
also take a look at that
http://www.unityjdbc.com/mongojdbc/setup/mongodb_jdbc_splunk_dbconnect_v2.pdf
kind regards
... View more
Ok i found a way you can do it.
Define your Tranforms.
Go to Data --> Sourcetypes --> Select the sourcetype on which you want to add the Transfomrations --> Click edit --> click advanced --> click "new setting"
Fill the first Field with "REPORT-yourreportname" and the second with "yourtransformationname"
this works. i tested it.
... View more
Hi,
try this. You cannot use the "Field Extractor" for this. Need to Settings --> Fields --> Field extractions --> New
"myregex" in source
looks something like this then.
(?<newfield>.*) in source
regards
... View more
Hi,
try this.
Settings --> Fields --> Field extractions --> New --> Type (Dropdown) Select "Uses Transform".
You can use multiple Transforms separating them by comma.
regards
... View more