As suggested in another thread, using eval in a count instead of 'by' clause worked for me:
search msgType=*| timechart span=1h count(eval(msgType=="IN")) as IN, count(eval(msgType="OUT")) as OUT | eval ratio=OUT/IN
... View more
I'm not sure how it came to be, but it looks like my _internal index's cold path has changed. This left a bunch of cold buckets in the old location which seems unreferenced by any index as seen by | dbinspect index=* .
As noted here:
https://answers.splunk.com/answers/108941/deleting-a-bucket.html#answer-108942
hot/warm/cold buckets should not be removed while the server is running, but in this case, it seems it can be done. Can someone confirm?
... View more
I have events from an application containing various logger type messages, I.e: INFO, WARN, ERROR... Searching just for the string 'ERROR' returns false positives as some INFO messages contain a matching string pertaining to error detection and such... How do I match these events similar to 'grep ^ERROR '?
... View more
I was getting this error when my inputs and outputs conf had encrypted sslPassword but I've forgotten to include the $SPLUNK_HOME/etc/auth/splunk.secret.
... View more
I was getting the following error when loading LDAP configuration from system/local/authentication.conf file:
Error binding to LDAP. reason="Invalid credentials"
The problem was due to me having bindDNpassword in a form of a hash instead of plain text. It turns out you need Splunk do the hashing on it own.
... View more
I was having Splunk time out after 'writing RSA key' when I was accepting the license by removing the ftr file. Instead, having the following in my init's start function works:
/opt/splunk/bin/splunk" start --accept-license --no-prompt --answer-yes
... View more