Activity Feed
- Got Karma for Re: How do I clear out my violations listed in the UI under Manager >> License ?. 12-04-2021 07:49 PM
- Got Karma for Re: How do I tell if a forwarder is down?. 10-18-2021 04:45 PM
- Got Karma for Re: How do i exclude some events from being indexed by Splunk?. 07-29-2021 06:17 PM
- Got Karma for Re: can I have a multiline search box?. 05-09-2021 10:57 PM
- Karma Re: How can I get a complete list of processes used by Splunk for Linux? for hexx. 06-05-2020 12:47 AM
- Karma Re: [SHC] Troubleshooting Configurations under Search Head Clustering for rbal_splunk. 06-05-2020 12:47 AM
- Karma Re: Indexer Clustering Search Factor and Replication Factor not Met for Streaming Buckets for rbal_splunk. 06-05-2020 12:47 AM
- Karma Re: Browser Unsupported on IE after upgrade to 6.2 for jdastmalchi_spl. 06-05-2020 12:47 AM
- Karma Re: Why is the Splunk Web service not running after an upgrade to 6.2? for hexx. 06-05-2020 12:47 AM
- Karma Re: Why does login page show "Your browser could not connect to Splunk.com..." after upgrading server to 6.2 in a closed environment with web.conf configuration? for Ellen. 06-05-2020 12:47 AM
- Karma What are the benefits of the KV store vs a traditional lookup table in Splunk 6.2? for responsys_cm. 06-05-2020 12:47 AM
- Karma Re: What are the benefits of the KV store vs a traditional lookup table in Splunk 6.2? for skylasam_splunk. 06-05-2020 12:47 AM
- Karma Re: What are the benefits of the KV store vs a traditional lookup table in Splunk 6.2? for jlin. 06-05-2020 12:47 AM
- Karma Re: Is it possible to get Splunk version 6.2 as Solaris Package that I can add with pkgadd? for gkanapathy. 06-05-2020 12:47 AM
- Karma Re: how can i see all of the searches that are looking for a specific field? for Flynt. 06-05-2020 12:47 AM
- Karma Re: How to change permissions on Splunk log files? for dshakespeare_sp. 06-05-2020 12:47 AM
- Karma Re: Splunkd SSL and Subject Alternative Names for mgaraventa_splu. 06-05-2020 12:47 AM
- Karma Re: How can I assign the day of the week to my events? for richgalloway. 06-05-2020 12:47 AM
- Karma Re: How can I assign the day of the week to my events? for Flynt. 06-05-2020 12:47 AM
- Karma Re: I changed Splunk from using SSLv3 to TLSv1.2, and the Splunk Java SDK will not connect.. for bosburn_splunk. 06-05-2020 12:47 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
1 | |||
2 | |||
18 | |||
2 | |||
2 | |||
0 | |||
1 | |||
1 | |||
1 | |||
2 |
Try modifying your saved search to add a NOT statement for that sourcetype
... View more
03-19-2010
04:39 PM
5 Karma
The default username and password for a new Splunk install is
user: admin
password: changeme
... View more
03-19-2010
04:35 PM
2 Karma
Run the command
./splunk enable module input/UDP input/UDP enabled.
You need to restart the Splunk Server for your changes to take effect.
... View more
03-19-2010
04:29 PM
1 Karma
Splunk is not able to blindly connect to a remote machine and collect system information. We require a user agent of some sort that will grant the necessary access. There are a number ways of that you can get data from remote systems into your Splunk instance.
You can install a forwarding agent on each of the machines that you wish to collect data from that will send events to the central indexer. More information on data cloning and routing can be found here: http://docs.splunk.com/Documentation/Splunk/5.0/Deploy/AboutforwardingandreceivingdataReceiving
You can configure syslog/syslog-ng to forward event data to a central Splunk index. You will then configure Splunk to listen on the specified UDP (syslog) or TCP (syslog-ng) port. More information on configuring Splunk to listen on a network port can be found here: http://docs.splunk.com/Documentation/Splunk/5.0/Data/Monitornetworkports
You can write a small script that collects the various files from your remote systems and feeds them into your index using our scripted input method. More information on scripted inputs can be found here: http://docs.splunk.com/Documentation/Splunk/5.0/AdvancedDev/ScriptedInputsIntro
... View more
03-03-2010
06:26 PM
2 Karma
There are a number ways of that you can get data from remote systems into your Splunk instance.
You can install a forwarding agent on each of the machines that you wish to collect data from that will send events to the central indexer. More information on data cloning and routing can be found here: http://docs.splunk.com/Documentation/Splunk/5.0/Deploy/Aboutforwardingandreceivingdata
You can configure syslog/syslog-ng to forward event data to a central Splunk index. You will then configure Splunk to listen on the specified UDP (syslog) or TCP (syslog-ng) port. More information on configuring Splunk to listen on a network port can be found here: http://docs.splunk.com/Documentation/Splunk/5.0/Data/Monitornetworkports
You can write a small script that collects the various files from your remote systems and feeds them into your index using our scripted input method. More information on scripted inputs can be found here: http://docs.splunk.com/Documentation/Splunk/5.0/AdvancedDev/ScriptedInputsIntro
... View more
02-23-2010
12:28 AM
3 Karma
This will send a cooked data stream to the indexer (10.1.12.1:9997) and a second smaller uncooked tcp stream to the third party (10.1.12.2:1234). If you need the second stream to be syslog out then you will need to shift that work to the indexer.
props.conf
[syslog]
TRANSFORMS-routing = routeAll, routeSubset
transforms.conf
[routeAll]
REGEX=(.)
DEST_KEY=_TCP_ROUTING
FORMAT=Everything
[routeSubset]
REGEX=(SYSTEM|CONFIG|THREAT)
DEST_KEY=_TCP_ROUTING
FORMAT=Subsidiary,Everything
outputs.conf
[tcpout]
defaultGroup=nothing
[tcpout:Everything]
disabled=false
server=10.1.12.1:9997
[tcpout:Subsidiary]
disabled=false
sendCookedData=false
server=10.1.12.2:1234
... View more
02-05-2010
01:08 AM
8 Karma
I'd like to able to install and configure the log forwarder using puppet. What needs to be done to make that happen?
... View more
01-29-2010
10:41 PM
9 Karma
A report is a visualization of the data that was returned by a given search. They allow you analyze the information you uncover through your searches and use it to create compelling stories.
A dashboard is a collection of objects (reports, links, etc.). This allows you combine multiple different "stories" into a single interface. From the documentation:
Use dashboards to highlight
interesting and useful aspects of your
data, link to important searches and
display common reports
Another way to look at it: The Search app contains an Indexing Activity dashboard. This dashboard has several different reports that visualize the state of various indexing operations. Each of these reports could be run independent of the dashboard and the two are not mutually exclusive.
... View more
01-28-2010
01:18 AM
1 Karma
sure but how do ensure that is the selection that they will always start with?
... View more
01-27-2010
05:44 PM
1 Karma
I've got an application that logs status events. The values in these events generally will not change. Is there a search that will tell me if the value a given field changed from one value (foo=bar) to another (foo=baz)? Kinda like fschange for events
... View more
01-26-2010
02:14 AM
6 Karma
How can I change the default search period for an app so that my users search the last 15 minutes by default instead of all time?
... View more
01-23-2010
09:42 PM
1 Karma
Splunk currently does not provide a unique event id but will in a future release. This Q&A talks about it in greater detail
... View more
01-22-2010
10:42 PM
2 Karma
Yes. Summary indexes do count toward your total daily indexing volume. From a license perspective summary indexes are no different than the main index. The only indexed data that does not count towards your license are Splunk's own log files.
... View more
01-22-2010
01:07 AM
9 Karma
Is there a recommended saved search I can run on the indexer to alert me when
the daily indexing volume is approaching the license limit?
... View more
01-21-2010
04:42 AM
Remove server A from the peer list in server B's distsearch.conf. Docs have an example here
... View more
01-20-2010
11:10 PM
1 Karma
$SPLUNK_HOME/var/lib/splunk/defaultdb/db/Sources.data
On a fresh install I see this file has something like this:
0 0 2147483647 0 0
What are the significance of these numbers?
Can you provide any more insight into what this file does and how it is structured?
... View more
01-20-2010
02:35 AM
5 Karma
I am curious if the data in index=_internal counts against the "peak usage" license restriction.
... View more
01-19-2010
08:12 PM
2 Karma
Under what circumstances does the splunkd service need to be accesable by anyone/thing besides the http server?
... View more
- Tags:
- configuration
- network
01-16-2010
01:08 AM
9 Karma
I need to know the breakdown of my license consumption on a per host, per source, and per sourcetype basis. What is the search to do this?
... View more
Labels
- Labels:
-
license
01-15-2010
10:11 PM
8 Karma
I want to Splunk to listen on a specific interface not 0.0.0.0. How do I do this?
... View more
01-15-2010
09:56 PM
1 Karma
What private key pairs are used to generate the hashed passwords in authentication.conf or the passwd file?
... View more
01-15-2010
04:43 AM
3 Karma
Hostnames in splunk can be set in many ways.
You can set it explicitly in inputs.conf .
For incoming TCP traffic, the host can be set with the following in your inputs.conf
connection_host = ip | dns
The host value can always be overwritten via props/transforms configurations. This is how the host value is set when the event is sourcetyped as syslog. Props/transforms configs will trump what is defined in inputs.conf
More details can be found here
... View more
01-15-2010
04:37 AM
2 Karma
What do I need to do to set the correct hostname for an event?
... View more
01-15-2010
03:46 AM
If you are more of a command line guy you can copy the $SPLUNK_HOME\etc\splunk-free.license to $SPLUNK_HOME\etc\splunk.license and restart Splunk
... View more
Like Ben said you can change these via Manager. These settings will persists until the next reboot or you restore the original log setting. This great when you know the specific area that you are troubleshooting
The majority of Splunk's log settings (including the number of copies to keep and the size at which it rolls) are specified in log.cfg. In 3.x the Splunkweb logs are controlled in $SPLUNK_HOME/etc/SplunkWEB.tac . When you make a modification here you can make the changes to log levels permanent.
You can also start splunk in debug mode ( splunk start --debug ) which will put all components of the product in debug mode until it is restarted
... View more
- « Previous
- Next »