Activity Feed
- Got Karma for Re: Universal Forwarder send syslog to a thrid party. 11-04-2020 04:03 AM
- Got Karma for Re: Universal Forwarder send syslog to a thrid party. 11-04-2020 04:03 AM
- Got Karma for Universal Forwarder send syslog to a thrid party. 11-04-2020 04:02 AM
- Karma Re: Message rate meter Exchange 2010 for ahall_splunk. 06-05-2020 12:46 AM
- Karma Re: Add a data size notation to the end of a value? for yannK. 06-05-2020 12:46 AM
- Karma Re: Add a data size notation to the end of a value? for yannK. 06-05-2020 12:46 AM
- Karma 500MB/day: How is compressed data counted for Katsche. 06-05-2020 12:46 AM
- Karma Re: 500MB/day: How is compressed data counted for Ayn. 06-05-2020 12:46 AM
- Karma Exporting views and searches. for smtnw666. 06-05-2020 12:46 AM
- Karma on windows, UI fails to save the license-master with "invalid string format" for yannK. 06-05-2020 12:46 AM
- Karma Re: on windows, UI fails to save the license-master with "invalid string format" for yannK. 06-05-2020 12:46 AM
- Karma Re: Is it possible to dedup by span? for sideview. 06-05-2020 12:46 AM
- Karma Re: Date time difference for yannK. 06-05-2020 12:46 AM
- Karma Re: Add commas to Exchange Table for skylasam_splunk. 06-05-2020 12:46 AM
- Karma Re: Error being generated by Exchange App for Brian_Osburn. 06-05-2020 12:46 AM
- Karma Re: What version of SSL does splunkd use? for ChrisG. 06-05-2020 12:46 AM
- Karma Re: New Dashboard Not showing up in my views navigation for _d_. 06-05-2020 12:46 AM
- Karma Re: 500 internal server Error and Windows winsock error 10055 (splunkd.log) after upgrading to 5.0.1 for Masa. 06-05-2020 12:46 AM
- Karma Re: Migrating from Windows to Linux for yannK. 06-05-2020 12:46 AM
- Karma Re: Splunk will not start and is waiting for config lock for yannK. 06-05-2020 12:46 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
1 | |||
0 | |||
1 | |||
0 | |||
0 | |||
0 |
08-22-2013
07:48 AM
Woops, yes i did move everything from windows to linux. Now i have folders in splunk/var/lib named " splunk\randomlogs\db " and " splunk\randomlogs\colddb " and " splunk\randomlogs\thaweddb " instead of a randomlogs directory and sub directories for db, colddb , and thawed . So far this hasn't caused any issues aside from the diag output. Aside from being a mess, is it ok to leave it this way or will this have further negative consequences?
... View more
08-22-2013
05:53 AM
While running splunk diag on an indexer, i received the following error messages. Any idea's as to what they mean or if there is a problem?
[root@splunk bin]# ./splunk diag
Ensuring clean temp dir...
Selected diag name of: diag-splunk.domain.org-2013-08-22
Starting splunk diag...
sh: lsb_release: command not found
No directory separator found in index path: $SPLUNK_DB\fw\db
No directory separator found in index path: $SPLUNK_DB\fw\colddb
No directory separator found in index path: $SPLUNK_DB\fw\thaweddb
No directory separator found in index path: $SPLUNK_DB\randomlogs\db
No directory separator found in index path: $SPLUNK_DB\randomlogs\colddb
No directory separator found in index path: $SPLUNK_DB\randomlogs\thaweddb
Thanks in advance!
... View more
08-14-2013
01:28 PM
What happened to the affiliate field? I have a timechart based stacked column based on a field with two values. I want to re-arrange so they are switched on the stacked column.
... View more
06-12-2013
02:23 PM
Splunkers,
I have been trying to add commas to all the default charts on the Exchange app. A few particular searches are giving me issues. I usually just use "eval count=tostring(count, "commas")" and it works like a charm. I am still trying to understand how the following search works and how to add commas to it. Any ideas?
This is the Environment Report - Mailboxes:
eventtype="msexchange-mailbox-usage" User="*"|dedup User|eval mailbox=1|eval mailbox200m=if(TotalItemSize>200000000,1,0)|eval mailbox500m=if(TotalItemSize>500000000,1,0)|eval mailbox1G=if(TotalItemSize>1000000000,1,0)|table User,TotalItemSize,mailbox,mailbox200m,mailbox500m,mailbox1G|addcoltotals labelfield=User label=Totals|search User=Totals|eval avgmailbox=round(TotalItemSize/mailbox)|table mailbox,mailbox200m,mailbox500m,mailbox1G,avgmailbox|rename mailbox as "# Mailboxes", mailbox200m as "# Mailboxes over 200Mb", mailbox500m as "# Mailboxes over 500Mb", mailbox1G as "# Mailboxes over 1Gb", avgmailbox as "Average Mailbox Size"|transpose 5|append [ search eventtype="msexchange-mailbox-usage" User="*"|stats max(TotalItemSize) as maxmailbox|eval column="Maximum Mailbox Size"|eval "row 1"=maxmailbox|table column,"row 1"]|rename column as "Field","row 1" as "Value"
Thanks in advance for any help with this.
I-Man
... View more
06-11-2013
07:50 AM
Sometimes perfmon is broken on the server itself. I had to run "C:\Windows\System32> lodctr /R" on the server in order for perfmon logs to be collected.
... View more
04-12-2013
12:09 PM
Copying the entire etc folder to the new instance would probably work (in my experience) although you may run into issues depending on what kind of config changes you have made. If i were you i would install fresh on each server, and copy the etc/apps directory to the Search Head, most apps shouldn't be necessary on the indexer (correct me if im wrong). And then copy /etc/system/local to both the indexer and search head. You will have to do some manual changes on these configs as each server has different roles, one searching, one just indexing.
... View more
04-02-2013
11:50 AM
I experienced this issue when i moved the app over from a windows to Linux environment. To fix, i simply re-installed the app and everything started running smoothly.
... View more
04-02-2013
06:38 AM
This happened in our environment when we switched from Windows to Linux. The AD config is exactly the same and only the linux machines have the error message...
... View more
03-06-2013
07:11 AM
Splunkers,
I have events from our Helpdesk ticketing system that have two date fields, DateOpen and DateClosed, both with the following format:
2013-02-25 12:50
2013-02-26 12:58
I am trying to write a report that shows average time from when the ticket was opened and when it was closed. Based on research, i think i need to convert these to epoch time using mktime and then do the subtraction, then convert back to ctime. Unfortunately, i cant get mktime to return any values.
convert timeformat="%y/%m/%d %H-%M" mktime(DateClosed) AS closedon_epoch | table DateClosed, closedon_epoch
Am i missing something here or am i going about this the wrong way? Thanks in advance for any help.
... View more
12-11-2012
08:37 AM
Ahh thanks. Out of curiosity, do you know what the period does prior to the "MB"?
... View more
12-11-2012
07:51 AM
So the following will add a $ symbol to the beginning of the value Revenue, like "$ 42"
... | eval Revenue="$ ".tostring(Revenue,"commas")
How do you add data size notations like MB or GB to the end of a value like "42 MB"
Thanks in advance for any help
I-Man
... View more
- Tags:
- eval
08-01-2012
12:12 PM
We are in the process of setting up a new AV server that has the ability to send events via syslog to Splunk. We do not want this going to the default index as this is not data that we need to retain for a long period of time. Does that answer your question? Thank you in advance for any help.
... View more
07-09-2012
12:18 PM
1 Karma
We have a VIP setup to load balance and forward all our syslog events to a pair of Non-indexing Splunk Heavy Forwarders. The forwarders then send to a 3rd party IDS as well as a pair of load balanced indexers that are connected to a search head.
We are about to send new syslog data to the VIP and want all data to go to a new index that we created. We would rather NOT create a new listening port on the Forwarders for this new traffic.
How do we send the specific syslog events to the specific index? Would this have to be done on the indexing side?
Thanks in advance for any help.
... View more
04-13-2012
11:08 AM
1 Karma
Ok, setup a test machine and tried it out. Putting "current_only = 1" under default does work. It is as simple as that.
... View more
04-13-2012
05:18 AM
We are a 90% Windows environment. Since we upgraded to 4.3.1, the WMI log format has changed ever so slightly. While this is not an issue with splunk, it is an issue with the 3rd party MSSP we are forwarding logs to. As Splunk hasn't responded with a fix or workaround since we upgraded (3 weeks), i would like to downgrade my forwarders back 4.2.3. As the only way to downgrade it to re-install, this will collect everything in the windows event logs, not just where it left off. As this affect 500+ windows boxes, we do not want to do that.
Is there an easy way to set current_only = 1 for all hosts in WMI.conf? Is it as easy as this?
[default]
current_only = 1
[WMI:host1]
event_log_file - Application, Security, System
interval = 5
server= host1
[WMI:host2]
event_log_file - Application, Security, System
interval = 5
server= host2
...
... View more
- Tags:
- current_only
- wmi
12-07-2011
11:25 AM
For me, the search head wouldn't recognize my custom "Security" index. However if i specified index=security it would find everything. I found that creating another Security Index on the search head itself, splunk wises up and includes it in the search without specifying.
... View more
11-07-2011
12:44 PM
There were a couple typos in your search but it works like this:
index=_internal metrics kb group="per_index_thruput" series=* earliest=@d | eval totalGB = (kb/1024)/1024 | timechart span=1d sum(totalGB) as total
Thanks Man!
... View more
11-07-2011
10:09 AM
1 Karma
Is there a way to send an alert if I exceed my license limit? Does Splunk generate a log when this happens?
Thanks in advance!
... View more
- Tags:
- Splunk License Usage
10-18-2011
02:55 PM
So.....isSticky="False" did work after a few trial and errors.
We set the values on the dashboard to what we wanted while "isSticky="False"" was not included in the xml. Once the values were set on the dashboard, we opened another tab with the XML, added isSticky="False", and saved. Once we refreshed the dashboard, the time range values are now stuck until changed.
... View more
10-13-2011
07:56 AM
I have code that displays a google map of successful vpn connections into our org. Currently, I can only access this dashboard/view by physcially typing in the URL as the name isn't showing up under the Views dropdown. XML noob here, what do i add so it's pulled under the View Dropdown in the search app?
<view template="dashboard.html">
<label>Successful VPN Connection Source Locations</label>
<module name="TitleBar" layoutPanel="viewHeader">
<param name="actionsMenuFilter">dashboard</param>
</module>
<module name="GenericHeader" layoutPanel="panel_row1_col1" autoRun="True">
<param name="label">Geographical Location</param>
<module name="HiddenSearch" group="Map View" autoRun="True" layout_panel="panel_row1_col1">
<param name="search">"assigned to session" "REMACC-VPN" OR "VPNCLIENTS" earliest=-1d@d latest=@d | convert ctime(_time) as timestamp | table timestamp vpn_user vpn_assigned_ip vpn_external_ip | lookup geoip clientip as vpn_external_ip | geonormalize</param>
<module name="GoogleMaps">
<param name="autoPostProcess">false</param>
<param name="height">950px</param>
<param name="mapType">terrain</param>
<param name="mapTypeControl">on</param>
<param name="navigationControl">on</param>
<param name="scaleControl">on</param>
<param name="scrollwheel">off</param>
<param name="zoomLevel">3</param>
</module>
</module>
</module>
Thanks,
I-man
... View more
- Tags:
- app-googlemaps-spp
09-26-2011
06:40 AM
I created a payload field that usually has about 8-20 lines of data. After the field was created, I clicked the field in the left hand section of the Search App and accidentally hit "Select/Show in results". Now I have a huge section of fields between each event due to the payload field containing so much data.
How do i remove this from showing in the search results? I looked everywhere and there does not seem to be an option to do this.
Thanks,
I-Man.
... View more
09-22-2011
12:41 PM
An upgrade resolved the issue.
... View more
09-20-2011
01:22 PM
Tried this and edited my original Post. No luck... thanks anyways.
... View more
09-20-2011
10:39 AM
All,
Below are the logs prior to splunk interpreting them. I want to split each event with a regex based on the lines of =+=+=+=+=+=+...which is consistently 37 patterns long.
[**] [1:2008581:3] ET P2P BitTorrent DHT ping request [**]
[Classification: Potential Corporate Privacy Violation] [Priority: 1]
[Xref => http://www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/P2P/P2P_Bittorrent_Traffic]
[Xref => http://doc.emergingthreats.net/bin/view/Main/2008581]
[Xref => http://wiki.theory.org/BitTorrentDraftDHTProtocol]
Event ID: 2 Event Reference: 2
09/19/11-23:09:15.740430 10.x.x.x:4566 -> x.x.x.x:59965
UDP TTL:126 TOS:0x0 ID:31114 IpLen:20 DgmLen:95
Len: 75
64 31 3A 61 64 32 3A 69 64 32 30 3A 49 78 E1 96 d1:ad2:id20:Ix..
61 63 FA 84 13 3A 96 C1 F6 76 DC 53 DE 87 CC 95 ac...:...v.S....
65 31 3A 71 34 3A 70 69 6E 67 31 3A 74 34 3A 67 e1:q4:ping1:t4:g
3B 36 79 31 3A 76 34 3A 55 54 62 B9 31 3A 79 31 ;6y1:v4:UTb.1:y1
3A 71 65 :qe
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
[**] [1:2010140:5] ET P2P Vuze BT UDP Connection [**]
[Classification: Potential Corporate Privacy Violation] [Priority: 1]
[Xref => http://www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/P2P/P2P_Vuze]
[Xref => http://doc.emergingthreats.net/2010140]
[Xref => http://vuze.com]
Event ID: 3 Event Reference: 3
09/19/11-23:09:15.889491 10.x.x.x:60653 -> x.x.x.x:35421
UDP TTL:62 TOS:0x0 ID:51471 IpLen:20 DgmLen:93
Len: 73
9E 66 87 A7 D0 2A 93 5F 00 00 04 06 96 3E 45 1A .f...*._.....>E.
32 00 00 00 00 00 32 04 CC 45 B6 01 EC ED E5 CE 2.....2..E......
09 70 00 00 01 32 83 F3 59 3E 14 41 7E D1 0C 90 .p...2..Y>.A~...
4D 4C 51 5D 69 43 F5 4C F1 46 00 BB EE C3 C2 02 MLQ]iC.L.F......
1E .
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Thanks,
Iman
UPDATE
With the following config, here are some results splunk is giving us:
[host::sensor01]
BREAK_ONLY_BEFORE_DATE = false
LINE_BREAKER = ([\r\n]*[=+]{74}[\r\n]*)
Results:
09/20/11-16:16:07.511888 10.255.4.201:52954 -> 64.208.138.115:80
TCP TTL:63 TOS:0x0 ID:2122 IpLen:20 DgmLen:48
******S* Seq: 0x4B5C56AC Ack: 0x0 Win: 0xFFFF TcpLen: 28
TCP Options (3) => MSS: 1460 SackOK EOL
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
[**] [1:2408054:271] ET RBN Known Malvertiser IP TCP (28) [**]
[Classification: Misc Attack] [Priority: 2]
[Xref => http://doc.emergingthreats.net/bin/view/Main/RussianBusinessNetwork]
Event ID: 55744 Event Reference: 55744
[**] [1:2010140:5] ET P2P Vuze BT UDP Connection [**]
[Classification: Potential Corporate Privacy Violation] [Priority: 1]
[Xref => http://www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/P2P/P2P_Vuze]
[Xref => http://doc.emergingthreats.net/2010140]
[Xref => http://vuze.com]
Event ID: 6519 Event Reference: 6519
09/20/11-20:16:05.267902 10.250.85.60:6881 -> 2.30.187.43:4860
UDP TTL:62 TOS:0x0 ID:60117 IpLen:20 DgmLen:93
Len: 73
E7 03 B0 4C 87 80 D6 64 00 00 04 06 D8 6C BE 4D ...L...d.....l.M
No consistency with the returned logs, not sure what I'm missing.
... View more
- Tags:
- line-breaker
- snort