Activity Feed
- Got Karma for Re: Using the transforms.conf file to only forward events that match a regex.. Tuesday
- Posted Which TA is able to collect Azure App Insights? on Getting Data In. 04-23-2024 08:25 AM
- Posted Re: Why is my powershell script for input-stanza not working? on Getting Data In. 10-17-2023 01:14 PM
- Posted Re: Why is my powershell script for input-stanza not working? on Getting Data In. 10-17-2023 04:45 AM
- Posted Re: Why is my powershell script for input-stanza not working? on Getting Data In. 10-16-2023 02:33 PM
- Posted Why is my powershell script for input-stanza not working? on Getting Data In. 10-16-2023 02:09 PM
- Got Karma for Re: KV Store Process Terminated. 10-09-2023 08:35 AM
- Got Karma for Re: Splunk DB Connect: How to resolve "Can not communicate with task server, check your settings" error messag. 10-04-2023 07:56 AM
- Posted Cisco Meraki Syslog - Bytes In, Bytes Out on All Apps and Add-ons. 09-14-2023 12:32 PM
- Posted Re: Why a complete 9997 traffic still fails? on Getting Data In. 09-12-2023 02:56 PM
- Posted Re: Why a complete 9997 traffic still fails? on Getting Data In. 09-08-2023 03:03 PM
- Posted Re: Why a complete 9997 traffic still fails? on Getting Data In. 09-08-2023 10:21 AM
- Posted Why a complete 9997 traffic still fails? on Getting Data In. 09-08-2023 09:02 AM
- Posted Re: Splunk DB Connect: How to resolve "Can not communicate with task server, check your settings" error messag on All Apps and Add-ons. 08-22-2023 10:39 AM
- Got Karma for How can I produce a timechart with 1 month span the average of count per day?. 07-28-2023 03:26 AM
- Posted Windows Event Value is `%d` for EventCode=1102 EventType=4 on Splunk Enterprise. 04-20-2023 07:12 AM
- Posted Dashboard Studio Underlying CSS Failure / UI Broken on Splunk Enterprise. 04-14-2023 07:29 AM
- Posted Re: How to get the size of a lookup file from Splunk search on Splunk Enterprise Security. 01-26-2023 03:33 PM
- Got Karma for Is it possible to get the value of a specific row of the $result.$?. 01-20-2023 04:18 AM
- Posted Re: Why can't we re-assign Calculated Fields' ownership via WebUI? on Knowledge Management. 01-09-2023 12:09 PM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
2 weeks ago
Also got the same issue during a Splunk upgrade, did a restart of the Splunk service and the KV store was fixed
... View more
09-23-2024
07:10 AM
This is the right answer
... View more
05-13-2024
06:58 AM
2 Karma
This is what I found and it worked! First of all the message, "Can not communicate with task server......" is vague and does not give a clear idea so it can be so many reasons, few of them are 1. Updating the java_home path 2. checking the jre version 3. Checking if the HF has approved license or is connected to the License Manager (its no longer the license master) 4. Change the task server port to 9995 or 1025, instead of 9998 What I Did was this: in the SPLUNK_HOME/var/log/splunk/splunkd.log is showed some error for dbx-migration.conf so i added these lines by creating dbx-migration.conf in /etc/apps/splunk_app_db_connect/local [encryption]
disabled = 0
upgrade = DONE Then a restart of splunkd. Works super smooth
... View more
04-23-2024
11:51 AM
Have a look at this one - maybe this would be of help, it mentions Azure App Insights (It's always worth perusing on Splunk base and working through the Azure TA's as to your requirements). The help file is within the TA so you would need to look at that for further help https://splunkbase.splunk.com/app/7246
... View more
01-25-2024
01:43 AM
Hi it's more or less same situation. You have those three options: Use lookup editor app Create own app which contains those definition and install it. In Victoria experience you can do it by your self On Classic edition you probably still need to create a support case or create cloud vetted private app on splunkbase from where you (probably) could install it by yourself? I said that the lookup editor app is probably the easiest way to do it unless your are familiar with your own apps and need this otherwise too. https://splunkbase.splunk.com/app/1724 r. Ismo
... View more
10-17-2023
01:14 PM
I have very little experience with scripting.
... View more
09-14-2023
12:32 PM
Do you happen to know if Cisco Meraki syslog, especially Flows and URLs have bytes in and bytes out? We're logging Meraki and there's no field whatsoever for bytes. Is it something that can be configured from Meraki logger console? Or the actual solution itself don't record that?
... View more
Labels
09-12-2023
02:56 PM
Network team confirms that the traffic couldn't return back to the source due to routing issue. The traffic from the src to dest via port 9997 ends only in the first SYN and the ACK couldn't go back.
... View more
04-20-2023
07:12 AM
Has anybody encountered Windows Security logs that look like this? If so, how did you guys fix it? Thanks in advance.
... View more
Labels
- Labels:
-
administration
-
configuration
04-14-2023
07:29 AM
Has anyone experienced this kind of broken UI on Dashboard Studio? I've tried to restart Splunk but it's still happening.
... View more
Labels
01-26-2023
03:33 PM
Please try this new custom command I built: https://splunkbase.splunk.com/app/6735
... View more
01-09-2023
12:09 PM
ChatGPT's response to my question: ``` In Splunk, it is not possible to re-assign the ownership of a calculated field via the WebUI. This is because calculated fields are owned by the user who creates them, and the ownership cannot be transferred to another user. The reason for this is that calculated fields are considered a type of saved search, and saved searches are owned by the user who creates them. Saved searches are a fundamental component of Splunk, and they play a vital role in many different aspects of the product. As a result, the ownership of saved searches is tightly controlled to ensure that users have full control over their own searches and are not able to access or modify the searches of other users. If you want to transfer ownership of a calculated field to another user, you will need to delete the calculated field and have the other user create a new calculated field with the same definition. Alternatively, you could share the calculated field with the other user, which would allow them to use it in their own searches and dashboards, but not to modify or delete it. ```
... View more
08-14-2022
08:28 PM
1 Karma
I had the same problem and I could get rid of that error by renaming "federated.conf.spec" file from $SPLUNK_HOME/etc/system/README path. Please upvote if this helpful. Thanks, Mitesh.
... View more
- Tags:
- I had
08-11-2022
11:16 AM
Hi Linux Experts! Need help on a script that I'm working on to log sudo-enabled users. The script that I'm using is below #!/bin/sh
getent passwd | cut -f1 -d: | xargs -L1 sudo -l -U | grep -v 'not allowed' It is a `.sh` file that's ran once a day. The corresponding output is then parsed and massaged by some SEDCMD stuff, not relevant here. This way, I can see which users are able to perform sudo on the machine. Note: I am aware of the `usersWithLoginPrivs.sh` but this includes users that I'm not interested. Hence the custom script. If there's another solution you can share, that'd be great. But here's my PROBLEM: linux admins are complaining that they're getting messaged because `splunk` user that runs this script is generating messages for them. And they don't want to get the messages. So, they suggested to append this command at the end of the script: > /dev/null 2>&1 which I did. However, it does not print output anymore for those Splunk UFs that previously were able to. Yes, the main solution to this problem is to give `splunk` user permission to run the script. But due to the complexity of our organization, we can't request the same thing across the board. So, basically, of the thousands of linux servers that we have some can run this script, some cannot. That's currently okay. But to those that cannot, I'd like to modify the script in such a way that it will still work the same but will not produce any error. Is there any alternative?
... View more
Labels
- Labels:
-
administration
08-02-2022
11:32 PM
This wont work, my actual values are move then 30K targets! the tables above was just to explain my logic how i want to compare both queries. each query returns around 12k targets
... View more
07-28-2022
01:18 PM
The correct form of shebang for python3 is #!/usr/bin/env python3 But that's not the main point here. Splunk should spawn its own python instance for python script regardless of the shebang (and shebang allows for easy testing outside of splunk environment)
... View more
04-12-2022
01:51 AM
Thanks. It did not parse the fields of the logs. I ended up writing our own props for it.
... View more
03-15-2022
01:40 PM
1 Karma
It's not a tarball so tar won't help. It's just a CSV file compressed with gzip. You should be able to view it using gunzip -c results.csv.gz | more
... View more
02-17-2022
10:07 AM
One way to see those even in fast mode is add “| fields *” after your 1st part. Is it wise or not is another story….
... View more
02-07-2022
10:19 AM
Hi Community, I'm no Windows expert and just trying to tune an alert that we have in place. It's firing whenever a UF that has `admon` has stopped sending `admon` logs. But I just noticed that `admon` logs can have similar `dcName` in multiple UFs. For example, a UF that's meta host is "serverA" sends `admon` logs for dcName="serverDC". And UF that's meta host is "serverB" also sends `admon` logs for dcName="serverDC". Would it be reasonable to just replace the host of the UF with the value for dcName under the ActiveDirectory props.conf stanza? Thanks.
... View more
Labels
- Labels:
-
configuration
01-26-2022
07:01 AM
1 Karma
Here is one old answer which could help you to replace join. https://community.splunk.com/t5/Splunk-Search/What-is-the-relation-between-the-Splunk-inner-left-join-and-the/m-p/391288/thread-id/113948 There are also several conf presentation which explain how to do join without join command. r. Ismo
... View more
01-25-2022
08:25 AM
Hello friends. We are in the process of moving the collection of o365 events which we currently do on an on-prem HF via "Splunk_TA_microsoft-cloudservices" to SplunkCloud IDM using "splunk_ta_o365". Using the same Client ID, Client Secret, and Tenant ID, we seem to be getting similar workloads: Aip, AzureActiveDirectory, CRM, Exchange, MicrosoftForms, MicrosoftStream, MicrosoftTeams, OneDrive, PowerApps, PowerBI, PublicEndpoint, SecurityComplianceCenter, SharePoint, SkypeForBusiness, Yammer But if we perform a comparison of number of events, we seem to get lower amount of data using the `splunk_ta_o365` in SplunkCloud versus the `Splunk_TA_microsoft-cloudservices` in on-prem. What seems to be the problem?
... View more
Labels
- Labels:
-
Splunk Investigate
-
using Splunk Cloud
11-10-2021
06:11 AM
What does the error below mean and how to remediate it? This is after running `splunk restart splunkweb` HTTP/1.1 404 Not Found
... View more
Labels
- Labels:
-
heavy forwarder
09-29-2021
11:26 AM
It is possible that there are other things going on that is causing this error than what is stated above. Since I identified a unique root cause I wanted to share with all. The last bullet below was what worked for me but the below bullets represents a summary of recommended steps to get to root cause for this. First verify that the size of the bundle being sent from SH is not greater than the bundle size limit setting on the SH (maxBundleSize distSearch.conf) or the Indexer (max_content_lengh server.conf) Then check for permissions/ownership errors on all the instanced by running “ls -lahR /opt/spunk | grep root” Then run ./splunk btool check Then check the CM bundle details and compare if the latest active bundle in the peers is same as the CM. Then run the top command to see if there are any resources using a significant percentage of CPU utilization over Splunk. A new application could have been introduced that is preventing writes from taking place over a long period of time due to files being locked by other application. This can be further verified by: Run the following on each indexer “sudo tcpdump <ipaddressofsourceSH>” then attempt to run your search from the SH and see if you see the commands coming over. If fails that there is an application that on in your environment that is preventing Splunk from doing what it need to do and you need to apply for an Splunk exceptions for the recently introduced application.
... View more