Activity Feed
- Karma Re: How can i query to get all alerts which are configured? for Smashley. 01-09-2024 08:28 AM
- Posted Re: How do I extract multiple values for a field in the same event using field extractions? on Splunk Search. 11-10-2023 08:26 AM
- Karma Re: How do I extract multiple values for a field in the same event using field extractions? for harsmarvania57. 11-10-2023 08:24 AM
- Posted Re: How to create editable table on dashboard on Dashboards & Visualizations. 10-30-2023 07:13 PM
- Karma Re: How to create editable table on dashboard for niketn. 10-30-2023 07:11 PM
- Karma Re: How to create editable table on dashboard for niketn. 10-30-2023 07:11 PM
- Posted Re: How can we create an API call that returns a link to a report? on Splunk Search. 06-14-2023 08:39 AM
- Posted Re: Onboarding local MS Exchange Server with audit and activity data like O365 on Getting Data In. 05-22-2023 11:16 AM
- Got Karma for Re: How can i query to get all alerts which are configured?. 05-15-2023 07:28 AM
- Karma Re: Diagrams of how indexing works in the Splunk platform (the ‘Masa diagrams’) for ppablo. 12-09-2022 08:54 AM
- Got Karma for Re: How can i query to get all alerts which are configured?. 07-22-2022 02:33 PM
- Got Karma for Re: How can i query to get all alerts which are configured?. 07-22-2022 02:32 PM
- Got Karma for Re: How can i query to get all alerts which are configured?. 02-10-2022 12:15 PM
- Got Karma for Re: How can i query to get all alerts which are configured?. 12-02-2021 07:24 AM
- Posted Re: Splunk forwarder oneshot continues to forward file data even when file is deleted? on All Apps and Add-ons. 10-08-2020 08:56 AM
- Karma Re: How to round stats average to 2 decimal places? for damiensurat. 08-26-2020 10:45 AM
- Got Karma for Re: How can i query to get all alerts which are configured?. 08-18-2020 11:35 AM
- Got Karma for Re: How can i query to get all alerts which are configured?. 08-18-2020 11:35 AM
- Karma Re: [SmartStore] How to verify splunk indexer connectivty to remote storage? for rbal_splunk. 07-13-2020 09:30 AM
- Karma Re: How can I change the logging level for something I am trying to debug? for khourihan_splun. 07-08-2020 02:29 PM
Topics I've Started
No posts to display.
05-21-2024
06:49 AM
Hi @niketn! The steps to move the lookup editor code into my own app worked great, thank you! In light mode, everything is working perfectly. However, for dashboards that are in dark mode, the editable lookup tables are being displayed as white text on a white background. Do you (or anyone else) have any tips on how to make the lookup editor tables display correctly in dark mode? Even just changing the background colour or text colour of the embedded editable lookup would be really helpful. Thank you so much for any help!
... View more
11-10-2023
08:26 AM
This topic is covered pretty well via the props/transforms settings as such: transforms.conf [mv_extract]
REGEX = \*\*\sRABAX\:\s(?<ABAPRABAX>.*)
MV_ADD = true
REPEAT_MATCH = true reference: https://community.splunk.com/t5/Getting-Data-In/Multi-value-field-extraction-props-conf-transforms-conf/m-p/210426
... View more
06-14-2023
08:39 AM
This one is pretty straightforward - keep in mind that the GET request will return in it's response a Search ID (sid). You can then, in a few minutes, return the results of that SID by just visiting the link, such as: https://<host>:8000/en-US/app/search/search?sid=1686664178.1739 If you would rather have the API pull the results back, send another GET to /<app>/jobs/<sid>/results like this - you can specify options such as output_mode and others: curl -u admin:changeme \
-k https://localhost:8089/servicesNS/admin/search/search/jobs/1423855196.339/results/ \
--get -d output_mode=json -d count=5 official docs here: https://docs.splunk.com/Documentation/SplunkCloud/latest/Search/ExportdatausingRESTAPI
... View more
05-22-2023
11:16 AM
Older question - but this still came up as a hit on my search results while trying to help another customer, so this might be useful here. You have to run (or let the splunk agent run and manage) the monitors and scripts responsible for monitoring exchange related logs. To start - I would locally (like to your laptop) download the Add-On, https://splunkbase.splunk.com/app/3225 From there, explore the inputs.conf configurations available in the subdirectories. These define what is to be collected. If you notice, there are a ton of inputs available. These are set to OFF by default. Let's take a look at one of them under \TA-Windows-Exchange-IIS\default\inputs.conf ####Exchange Server Version 2010 - Start####
[monitor://C:\Program Files\Microsoft\Exchange Server\V14\Logging\Ews]
whitelist=\.log$|\.LOG$
sourcetype=MSWindows:2010EWS:IIS
queue=parsingQueue
index=msexchange
disabled=true
initCrcLength=8192 The monitor stanza is defining the location of the path - so in this case, the files are stored in that file path (...\logging\EWS). The whitelist/allowist statement specifies that all files in that directory ending in .log or .LOG are to be allowed. The 'disabled' statement is currently set to false, as per the default. To get this working, copy this stanza to a /local/inputs.conf directory, change disabled to '=false' and deploy to the machine that is running exchange. You will need a a UF, or Heavy Forwarder or some other way to getting data to splunk indexers. Use a similar process for the many other inputs you have available. Do not turn on all inputs unless you really need them and have done capacity planning as it can be a lot of volume.
... View more
This is an older thread, but as I recently stumbled upon it and encountered some confusion, in the hopes it clarifies this topic a bit, here's my experience. I've used the previously suggested search (ie, including '| alert.track=1' ) and found that as of this writing in (Splunk 9.0.4), alert.track=1 seems to mean that the 'action' of 'Add to Triggered Alerts' is enabled for that particular alert, and because that specific 'Add to Triggered Alerts' action isn't available for Reports, one can conclude it is in fact an Alert. Conversely, though, alert.track=0 isn't exclusive to Reports, and an Alert can use other actions aside from 'Add to Triggered Alerts', like email/slack/etc and in that case alert.track=0. In fact, that 'Add to Triggered Alerts' action isn't listed in the 'actions' field in the search results, only alert.track=1. So to summarize alert.action=1 does explicitly mean Alert, but alert.action=0 does not exclude it from being an Alert. Unsure if this functionality changed at some point in the years since this question was asked. Depending on one's interpretation of OP's question, alert.track value may or may not be relevant. In any case, thanks to all who responded as this has helped me a great deal in solving my own requirements.
... View more
11-15-2022
02:50 AM
| stats earliest(_time) AS Earliest_Time
| eval Earliest_Time=strftime(Earliest_Time,"%Y-%m-%d %H:%M:%S") can be replaced by a simple | stats earliest(_time) AS _time Splunk formats _time by default which allows you to avoid having to reformat the display of another field dedicated to time display.
... View more
09-01-2022
07:04 AM
Hi @dkeck What is the use of move_policy = sinkhole And In which scenario we go for batch ?
... View more
04-05-2021
01:54 AM
Just came along this old post, happy to give some karma to an old friend 😊
... View more
03-10-2020
01:48 PM
Another good place to look for bottlenecks are in the monitoring console -> indexing -> performance -> indexing performance:deployment... then look for the queues at 90th percentile and see how much they are utilized... these indexing queues will fill up and cause performance issues, which is a good place to start troubleshooting.
next steps would be to see which sourcetypes are consuming the most resources and optimize them using props/transforms.
additionally alerting is triggered by your search-heads so make sure your sh resources are ok too, you can see them in a similar fashion in the monitoring console under search -> activity
... View more
03-18-2020
02:10 AM
Thanks, that solves the problem I've been struggling with.
... View more
01-25-2019
08:48 AM
I can confirm - this is the definitely the issue!! Thanks hayduk - I will escalate this as much as I can
-ali from Splunk PS
... View more