Activity Feed
- Posted Instead of using Job Manager, rest call to kill/stop all running current adhoc jobs for one user? on Splunk Search. 06-01-2021 08:53 AM
- Got Karma for How to find all Dashboards, Reports and Alerts related to a specific index ?. 09-24-2020 03:06 PM
- Got Karma for Splunk App for CEF not sending data. 06-05-2020 12:47 AM
- Posted How to find all Dashboards, Reports and Alerts related to a specific index ? on Splunk Search. 05-16-2019 08:14 AM
- Posted Re: Dynamic Text on Dashboard description Area. on Dashboards & Visualizations. 05-01-2019 05:05 AM
- Posted Re: How to use Accelerated Reports in a Dashboard on Dashboards & Visualizations. 04-18-2019 09:36 AM
- Posted How to use Accelerated Reports in a Dashboard on Dashboards & Visualizations. 04-18-2019 07:56 AM
- Posted Report Acceleration - Time frames on Reporting. 04-15-2019 06:23 AM
- Posted Re: Memory Usage Exceeded when using accelerated report? on Reporting. 04-08-2019 04:35 AM
- Posted Re: Memory Usage Exceeded when using accelerated report? on Reporting. 04-05-2019 04:35 AM
- Posted Memory Usage Exceeded when using accelerated report? on Reporting. 04-04-2019 12:58 PM
- Posted Re: How to get time variables from a dashboard to use to eval the amount of time being searched? on Dashboards & Visualizations. 04-04-2019 07:41 AM
- Posted Re: How to get time variables from a dashboard to use to eval the amount of time being searched? on Dashboards & Visualizations. 04-04-2019 06:37 AM
- Posted How to get time variables from a dashboard to use to eval the amount of time being searched? on Dashboards & Visualizations. 04-04-2019 06:13 AM
- Posted Is there a way to see the properties of a Role from the internal logs? on Reporting. 12-04-2018 11:50 AM
- Tagged Is there a way to see the properties of a Role from the internal logs? on Reporting. 12-04-2018 11:50 AM
- Tagged Is there a way to see the properties of a Role from the internal logs? on Reporting. 12-04-2018 11:50 AM
- Posted How to update a timestamp field in a lookup csv that has many fields, but when you only want to update one field? on Splunk Search. 06-21-2018 10:56 AM
- Tagged How to update a timestamp field in a lookup csv that has many fields, but when you only want to update one field? on Splunk Search. 06-21-2018 10:56 AM
- Posted What kind of input is CheckPoint Opsec Lea considered? on All Apps and Add-ons. 06-01-2018 09:14 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
1 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
06-01-2021
08:53 AM
Does anyone know of a rest call that can be used to kill all adhoc queries for a user? I do not wish to all users searches, nor do I want to kill schedule searches for that user. I have the following rest query to identify the current running query for Running_man. | rest /services/search/jobs/ | search author=Running_man dispatchState=RUNNING | search NOT id=*scheduler* | table title id normalizedSearch runDuration I just would like to be able to kill/stop the results found versus having to go into the job manager.
... View more
05-16-2019
08:14 AM
1 Karma
Our Splunk instance is being overhauled and I need to update all of the content that has been built. We have some indexes that are changing name, and I am looking for a query that I can run to find all Dashboards, Reports and Alerts that are based of specific indexes.
I.E. index=main is changing to index=core.
I need to search for all Dashboards, Reports and Alerts that reference index=main so I can change them to index=core.
... View more
- Tags:
- splunk-enterprise
05-01-2019
05:05 AM
@niketnilay Thank you for the answer above. I am in a similar situation, and can't figure out how to use your answer to display last months name in the description. I.E. I run a report on may 1 for totals for April. I want to display April, 2019 in the description. I can't figure out how to get the previous months value.
Thanks,
John
... View more
04-18-2019
09:36 AM
No, I was in the dashboard and Added Panel from New Report which does not have a time picker.
I added a time picker to the dashboard, but that has not effect on the panel the report is in.
So, I added another panel. I created a panel with the exact same search string as the report, and change the time range to 30 days, it doesn't want to use the summary index from the report acceleration.
... View more
04-18-2019
07:56 AM
I have a report "CheckPoint Blocks" that has a time span of 1 hour.
I have accelerated that report for 1 month.
I have a Dashboard and have added from Reports "CheckPoint Blocks".
The dashboard panel shows data for the 1 hour of the original report.
How do I show data from the Accelerated Report for 1 month in the dashboard?
... View more
04-15-2019
06:23 AM
I am trying to make sure that I am doing this correctly, because it doesn't appear to be working.
I have a report for last 24 hr of CheckPoint drops.
i.e. index=CheckPoint action=dropped | timechart count by action
I then select Report Acceleration and select 1 month.
I then create a dashboard that uses the same Report query with a time span of 30 days.
i.e. index=CheckPoint action=dropped | timechart count by action
Report Acceleration completes.
The dashboard should use Report Acceleration to populate, correct?
... View more
04-08-2019
04:35 AM
I understand where the limitation is, but why is it hitting that limitation if the report is using the accelerated reports data that has already been gather 100%.
My Accelerated report to collect firewall stats is 100% completed. I am running a timechart on the data that has already been collected. So in my mind the way accelerated reports work, my report should just be pulling the stats from the accelerated reports which should be minimal. Is my understanding of accelerated reports incorrect?
... View more
04-05-2019
04:35 AM
I understand accelerated searches take a lot of indexer time when they are building, but the accelerated report (30 days) is 100% complete. So, when I run the report (7 days) that uses the completed report acceleration, it should be pulling from the completed acceleration report, correct?
... View more
04-04-2019
12:58 PM
I am using report acceleration.
My orginal report was for 1 hr.
index=ckpfw002 sourcetype=opsec action=blocked OR action=dropped
| timechart count
I accelerated the report for 30 days.
Now that it is 100% completed, when I run the report for say 7 days, it says "Dispatch Command: The search processs with sid=1554406128.97404_37C9C149-435D-43B6-AA71-9D2A5518DF5F was forcefully terminated because its physical memory usage (28177.609000 MB) has exceeded the 'search_process_memory_usage_threshold' (24000.000000 MB) setting in limits.conf."
When I look at the job inspector, it is using the accelerated report --> [splunk-idx-1023] Using summaries for search, summary_id=C67F4BC3-E7CF-4AC4-9CF9-090758F478F6_search_u621929_NS000f0d20f92d3c54, maxtimespan=30m
I am trying to do a timechart for the entire month, but it fails even when I select 7 days. Any Suggestions?
... View more
04-04-2019
07:41 AM
@kamlesh_vaghela I would like to find out what percentage of the 5 minute periods wrote locally. However when I try the percentage eval statement below it fails.
index=nagios "Writing logs locally due to high log rate"
| stats count by dest
| sort by – count
| addinfo
| eval secs= info_max_time - info_min_time
| eval minutes=secs/60
| eval 5minperiods=round(minutes/5,2)
| eval percentage=round(count/5minperiods,2)
| fields dest count 5minperiods percentage
... View more
04-04-2019
06:37 AM
Thank you !
... View more
04-04-2019
06:13 AM
I am trying to createa dashboard where you can select the time frame, then in the dashboard search, I want to use the timeframe selection to find the amount of time being selected in minutes to be used in a formula.
Example: You select 24 hours. Using the earliest and latest time variables, I want to calculate the time being search I.E. 24 hours or 1440 minutes.
I then want to take the 1440 minutes and divide by a number.
... View more
12-04-2018
11:50 AM
I want to create a report or a dashboard to show roles and what indexes they have access to. Is there a way to do so from the internal logs?
... View more
06-21-2018
10:56 AM
I have a lookup with 4 fields per record. I want to update one of the fields, a timestamp with the last seen event time per host. How do I have the search query find the results and update just the timestamp field in the lookup table?
I.E Lookup.csv
CLM_pair Firewall_name Logging_Device Last_Seen
Here is what I am trying but doesn't work.
| inputlookup CheckpointFW.csv
| append
[ search index=ckpfw002 sourcetype=opsec
| rex "CN=(?P \S+),"
| fields _time FW
| stats values(FW) as "Firewall_Name" latest(_time) as "Last_Seen" by FW
| convert ctime("Last_Seen") ]
| stats count by Firewall_Name Last_Seen
| outputlookup append=true CheckpointFW.csv
... View more
06-01-2018
09:14 AM
We are seeing events being dropped at the forwarder. Can persistent queues be used for this connector? Trying to figure out the type of input to determine if persistent queues can be used.
... View more
05-21-2018
10:38 AM
I wish I had the monitoring console access. Unfortunately I don't have full access but trying to help others that do.
I did search for Blocked or indexscopedsearch and didn't come back with anything really useful.
I have found a huge difference in the numbers between Metrics and TSTAT as far as EPS and Total event are concerned for the forwarder each hour or day.
Thanks again for trying to help. I will I had admin access, but I don't. 😞
... View more
05-21-2018
07:19 AM
Thank you for responding,
We only have 1 firewall feeding that connector.
How can I see the information on the indexers being blocking or queue-fill issues? We have a lot of indexers. I don't have full admin rights, but can poke around with some searches.
I did not get any warnings or messages when I ran the TSTATS command.
... View more
05-21-2018
06:14 AM
We are having issues with a OPSEC LEA connector. The Checkpoint firewall is showing say 5,000,000 events per hour.
Using Metrics from Splunk;
index=_internal host="splunk-fwd-1 component=Metrics
| stats sum(ev) as Total
| eval Total_Events=round(Total)
| fields - Total
| fieldformat Total_Events=tostring(Total_Events,"commas")
Shows 5,500,000 events for the time frame process by the forwarder.
Using TSTATS;
| tstats count where index=checkpoint by host,_time span=1m
| search splunk_forwarder=splunk-fwd-1
| chart sum(count) AS Total_Event_Count
| fieldformat Total_Event_Count=tostring(Total_Event_Count,"commas")
Shows 3,000,000 events for the time frame indexed
Where are the events? We see that using index data that the event count vs what is seen on the firewall is significant less than expected. Even if we go back say a month, it isn't like the events are delay coming in. Are we really losing 2 million events per hour?
... View more
01-22-2018
11:54 AM
I am running 2 searches from 2 different source types.
Search 1 Search for sidewinder traffic that went through attempting to make an FTP connection
[search index=sdwfw001 fac=f_http_proxy url=* request_command=CONNECT |stats count by dest_IP url | rename dest_IP as dest_ip | fields dest_ip ]
Search 2 Search the checkpoint firewall traffic for the previous traffic adding the policy that fired.
index=checkpoint rule=*
My search:
index=checkpoint rule=* [search index=sdwfw001 fac=f_http_proxy url=* request_command=CONNECT |stats count by dest_IP url | rename dest_IP as dest_ip | fields dest_ip ] | stats count by dest_ip policy_name
My search works, but I don't know how to bring the URL from the sub search, because when I do it then searches for it in the 2nd search and URL is not there. In the end I would like a stats count by dest_ip policy_name url
... View more
- Tags:
- subsearch
05-02-2017
05:59 AM
I am trying to see who and when someone change a correlation search in Enterprise Security.
... View more
05-02-2017
05:21 AM
We have multiple people making changes to the content in Splunk Enterprise Security and I need to be able to track down when someone changed content.
... View more
02-13-2017
11:22 AM
The Websphere admin has rsyslog the files over to a syslog server. I am having issues configuring the Splunk Add-on for IBM WebSphere Application Server to pull the log files from the directory. Normally, I would just setup a monitor stanza, but this Add-on doesn't seem to like it. Any help would be appreciated.
Thanks
... View more
02-01-2017
11:31 AM
We would like to add domains to the current threat list. I would think I could add to local_intel_domain or local_intel_http to have the domains be found. However, after attempting to add to either, and rebuilding the data model, nothing is found.
Thanks
... View more
10-05-2016
07:22 AM
I have created a DBConnect Lookup for a SQL Database connection. However, I am unable to get it to work correctly in my search. Any help would be appreciated.
DBConnect
Field = Card_Number Column=Account_Number
Output
Columns New Output Field
First_Name customer_first_name
Search string that is not working
index=transactions CARD_NUMBER=* |eval CARD_NUMBER = "APR00" + CARD_NUMBER | lookup db_connect_Credit_Card Account_Number as CARD_NUMBER OUTPUT First_Name as customer_first_name
... View more
09-24-2016
05:06 AM
I don't know Sql very well. I tried to use examples I found in here to get it to work, but nothing I have tried has worked. Can you reply with the SQL command that you think would work?
The wrap=t came from dbconnect when I selected automatic mode and pulled from one table. So, I figured that is needed for DBConnect 2.
Thanks,
John
... View more