Sankarms,
Here is an example you can paste directly into your Splunk search bar, to extract the length found and label it as 'length':
| makeresults | eval example="[27/Oct/2016:20:08:57 --0700] WBLBSdFyTFYAAHPuH1kAAAAM Content-length: 0" | rex field=example "Content-length:\s*(?<length>\d+)"
If the content above looks good, your search should be as follows:
"Content-length: " | rex field=_raw "Content-length:\s*(?<length>\d+)" | stats count(length)
... View more
Hi Jawid,
I don't believe there is due to the license agreement imposed by Splunk and that their apps are hosted on CDN's at unique ID'd URL's
... View more
Hi Jawid,
Try editing the following file and see if that helps. Also, check your '/etc/resolv.conf' to be sure it is pointing at the DNS you intended
::$SPLUNKHOME/etc/splunk-launch.conf
#Add proxy settings as needed, then restart the splunk server
#This one is for a proxy with no authentication
http_proxy=proxy.local:80
#Use the one below for a proxy with authentication
http_proxy=a_user:a_password@proxy.local:80
... View more
Thank you for accepting! I'm glad I could help.
Some index names are queried by 'apps' but for the most part, most apps play it safe by querying across all accessible indexes and looking for a specific 'sourcetype' instead.
... View more
I think it is giving you the match and sub-match or the match array, which is why it appears twice.
Does appending max_match=1 to the end of your 'rex' search help?
... View more
Sorry about that. I left off the named group.
I'm not sure why that is not matching, @sundareshr appears to working. I just added a bit for the beginning of the line.
... View more
Jason,
Your deployment server handles clients, if 'siem2' is an indexer, it accepts data inputs. Therefore, on your indexer, you simply need to add a input for /opt/logs/tmcm/ like below.
::$SPLUNKHOME/etc/system/local/inputs.conf
[monitor:///opt/logs/tmcm]
index=<index of your choice>
#You do not need the whitelist (this is an example below and is commented out)
#If you want to include certain file names from the 'tmcm' directory
#whitelist=(\.log|log$|messages|secure|auth|mesg$|cron$|acpid$|\.out)
disabled = 0
... View more
kungfu,
The indexes are only needed if you do not plan to change the default location that some of the inputs are configured to send data to.
I would also like to say that I would recommend keeping the windows and unix separate, in case down the road you decide to limit the access to specific data (be it Windows or *Nix).
Therefore, maybe make indexes as such to make searching easier but still separates operating system.
#Windows Security Events
index = win_security
#*Nix Security Events
index = nix_security
#Therefore when you execute a search, do the below to access both sets of data
index = *_security
... View more
Delly,
Adding the app to the indexers will then allow you to configure the data inputs. From there, you will choose which index the data goes to. I've included some screenshots of what you should see on your indexers after the add-on is added.
... View more
The queries to SC should be done via REST, either HTTP(TCP:80) or HTTPS(TCP:443)
Indexes will be needed to be created. You can expedite this process by installing the add-on to your Indexers or creating a Search Head bundle and deploying it as such to your Indexers.
http://docs.splunk.com/Documentation/Splunk/6.5.0/Indexer/Updatepeerconfigurations
... View more
Technically you have capturing groups as well, but I also used non-capturing groups so that Splunk doesn't interpret any other data (not that it should).
Glad it worked for you!
... View more
How about using a quantifier? This will restrict it to the first match
rex field=statement "(?[^\s]{1})"
Your use of the "+" (plus sign) indicates to 'regex', one or more matches
... View more
Jack,
Sorry for the misunderstanding.
When you say remote Azure server, you mean the instance in which you have deployed the Azure Add-On?
If you are talking about the Add-On, then the files I mentioned above are configuration files you would find on the Splunk Universal Forwarder
... View more
::$SPLUNKHOME/etc/system/local/inputs.conf
[default]
host = <hostname>
::$SPLUNKHOME/etc/system/local/server.conf
[general]
serverName = <hostname>
pass4SymmKey = $1$foobar
Check the above files and make sure they have the hostname you would like. If you are running on a NIX platform, also check the /etc/hostname file.
... View more
prakashbhanu407,
index=foo_bar | eval WeekOfYear= strftime(_time, "%V")
The above will format the time to the 'WeekOfYear'. From there, you can perform a modulus against the week like below.
index=foo_bar | eval WeekOfYear = strftime(_time, "%V") | eval ret_val = WeekOfYear % 2
Therefore, if ret_val == 0, it's EVEN. ret_val == 1, it's ODD.
... View more