Activity Feed
- Karma Re: Separate multi-value field in individual fields for fz. 01-06-2022 12:25 PM
- Got Karma for Re: how to extract one value from log. 02-18-2021 05:17 AM
- Posted Re: how to extract one value from log on Splunk Search. 02-18-2021 12:52 AM
- Posted Re: how to correlate events from PaloAlto VPN logs and Windows authentication per user, comparing src_ip and machine_nam on Splunk Search. 02-17-2021 11:48 AM
- Posted Re: Comparing two fields in different format from two different sources on Splunk Search. 02-17-2021 11:22 AM
- Posted Re: how to extract one value from log on Splunk Search. 02-17-2021 11:01 AM
- Posted Re: WILDCARD in LookUp .csv files on Splunk Search. 07-31-2020 04:49 AM
- Posted Re: WILDCARD in LookUp .csv files on Splunk Search. 07-31-2020 02:06 AM
- Karma Re: Query running time for micahkemp. 06-05-2020 12:49 AM
- Karma Re: How to set a query to run from Monday to sunday for mayurr98. 06-05-2020 12:49 AM
- Karma Re: How to set a query to run from Monday to sunday for skalliger. 06-05-2020 12:49 AM
- Karma Re: how to add a field like "host, source, sourcetype"? for micahkemp. 06-05-2020 12:49 AM
- Karma Re: Grouping the events for DalJeanis. 06-05-2020 12:49 AM
- Karma Re: Filter time-based values from inputlookup by time picker range for peter_krammer. 06-05-2020 12:49 AM
- Karma Re: How do I set search start time and end time on dashboard? for kamlesh_vaghela. 06-05-2020 12:49 AM
- Karma Re: How to group my search results with respect to response time ranges? for JDukeSplunk. 06-05-2020 12:49 AM
- Karma Re: Alert for monthly reporting for hardikJsheth. 06-05-2020 12:49 AM
- Karma Re: How to compare multiple fields? for somesoni2. 06-05-2020 12:49 AM
- Got Karma for Re: Alert looking for no records over 6 hour time frame will not fire. 06-05-2020 12:49 AM
- Got Karma for Re: Alert looking for no records over 6 hour time frame will not fire. 06-05-2020 12:49 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
02-18-2021
12:52 AM
1 Karma
Hi @ivana27 , @gcusello is right. So you mean the log format is going to be the same and country value will change ? And you want to extract licensePlate values on this pattern of logs? Try something below, | rex field=_raw "country=\d+\, licensePlate=(?<LicensePlateNumber>[^ ]+)"
... View more
02-17-2021
11:48 AM
Hi @jfeitosa_real , Do you have all the mentioned values are extracted into fields on both type of logs? Which value will be same in both and which one may vary? We need at least one common value from both the logs to correlate and compare. Say example if the user ID is same in both, We can correlate both the logs and compare the IP address and fire an alert if IP is different from one to another. If we need to compare both User ID and IP Address, is there any other common values from both the logs are available? Like, Session ID, Trans ID or something like that?
... View more
02-17-2021
11:22 AM
Hi @amsagg Try Something like below, index=stream_dns dest_asset_tag=*dns OR dest_asset_tag=A | rex field=fieldB "(?<fieldB>[^\.]+)" ## To extract first portion to match with your lookup filed value | table fieldB | eval Flag="1" | append [| inputlookup dnslookup.csv | table fieldA | rename fieldA as fieldB | eval Flag="1"] | eventstats sum(Flag) Flag by fieldB | dedup fieldB | where Flag=1 ##If the field value exists in both index & lookup, the flag will be set to 2. Hence filtering to 1 | table fieldB
... View more
02-17-2021
11:01 AM
Hi @ivana27 , If you want to extract only from the mentioned log, include the unique information from the specific log | rex field=_raw "country=111111\, licensePlate=(?<LicensePlate>[^ ]+)"
... View more
07-31-2020
04:49 AM
Can you elaborate your requirement a bit more, So you want to filter your results with the prefix field values in the csv and again assign a state field value to the results? If above is your requirement, try the below query. source="log2.log" host="prod-splunk-indexer" sourcetype="testsource" prefix=*
[| inputlookup prefixlookup.csv
| table prefix]
| lookup prefixlookup.csv prefix OUTPUT state
| table prefix state
... View more
07-31-2020
02:06 AM
Hi @boromir Can you try the below, Go to Lookup definition --> Advanced options --> Match Type, and enter WILDCARD(FieldName) FieldName - The field which consists of wild card in the lookup file. Check and let me know if you still come across any issues.
... View more
12-03-2018
10:17 AM
Thank you for the immediate response @whrg. This query limiting the numbers to 3. I need it depends on the user input.
... View more
12-03-2018
10:15 AM
Awesomw @kamlesh_vaghela. This is what I am looking for.
... View more
12-02-2018
12:45 PM
Hi Team,
I am creating a form where a user can input a set of values separated by commas. Below are the details and example.
I need to generate a table with a set of jobs along with some other information.
The job name will have a unique ID. Those IDs will be provided as a comma separated input by the user.
Job_Name=aaa.bbb.ccc.xxxxx(UniqueID).dddddd.ccccc
So, the user input needs to be applied in the Job_Name field in a OR condition. Like below,
Say example user imput is 12345, 09876, 67543
I need to generate a search like index=something sourecetype=something Job_Name=aaa.bbb.ccc.12345.dddddd.ccccc OR aaa.bbb.ccc.09876.dddddd.ccccc OR aaa.bbb.ccc.67543.dddddd.ccccc.
Please help me out on this.
... View more
11-23-2018
05:40 PM
Hi All,
I am using a form where I will get input for one field and produce results using it. The input may contain wild cards sometimes.
Here is the issue when the input contains a wild card.
Example:
Input field Name - SampleName
SampleName - Jobname.id.*.runtime
When using the above search, I only want to match the events that contains below:
Jobname.id.12345.runtime
Jobname.id.34521.runtime
Jobname.id.87645.runtime
But I am getting some more matching events including the said ones.
Jobname.id.12345.runtime - Needed
Jobname.id.34521.runtime - Needed
Jobname.id.87645.runtime - Needed
Jobname.id.87645.turn1.runtime - Not Needed
Jobname.id.12345.turn2.runtime - Not needed
Jobname.id.87645.trn.runtime - Not Needed.
Please help me to fine tune my query to only match the events I need.
... View more
08-02-2018
02:04 PM
@somesoni2
I am getting below error while using this query after the splunk upgrade to 7.0. Any thoughts?
Error in 'search' command: Unable to parse the search: 'AND' operator is missing a clause on the left hand side.
... View more
08-01-2018
02:37 PM
Hi @kamlesh_vaghela,
I am using this in my dashboard, for earliest and latest time. It is working fine but there is small issue. Whenever I am launching the dashboard, getting invalid earliest time message first and then the data getting loaded. So when I am trying to schedule the dashboard pdf delivery. getting invalid_earliest time message in all the panels.
| makeresults | eval
H=tonumber(strftime(now(),"%H")), NOW
= if(H<5,now()-20000,now()) | eval starttime=strptime(strftime(NOW,"%d/%m/%Y
07:00:00 AM"),"%d/%m/%Y %I:%M:%S %p")
, endtime=starttime+79200
... View more
04-19-2018
10:37 AM
Hi All,
I want to compare three fields value(may be) to arrive at new field. (mentioned 3 as it may require to compare the actual start time with expected start time and current time)
I am having some fields from my look up. Job_Name and expected_start_time. And I am calculating the actual_start_time from the search query result.
So I want to create a new field like Status which tells me whether the job started on time or it is delayed or Expected start time not yet arrived.
Below is the sample output i am looking for. Consider the current time is 13:10
Job_Name Expected_start_time Actual_Start_Time Status
1a 08.30 10.00 Late start
1b 10.00 09:00 Started Earlier
1c 13:00 -- Not yet started on the expected start time
1d 18:00 -- Waiting for the expected start time
... View more
04-17-2018
07:17 PM
Got the answer from this post.
https://answers.splunk.com/answers/208671/how-to-create-a-table-with-a-static-column-a-and-d.html
... View more
04-16-2018
11:30 PM
Hi @deepashri_123
Thanks for your response. It is giving the same result what I have already.
... View more
04-16-2018
11:22 PM
Again it is listing down the values which are returned from the search query.
I need Category and job values from my lookup table to be in the table as static irrespective of the search result.
Say example I am having 10 values for job and equivalent category values in my look up file. From the search I am getting the status, StartTime, EndTime fields and its values.
There are scenarios, I will only get status, Startime and endtime only for 5 job and category values from my search result. In such cases my output table will have only 5 rows for which the search given results.
But I want to create like, My table should always show all the values(10 values) of Category and job, Other fields values should get updated upon the search result. So in the above example, my resulted table should be like.
Job Category Status StatTime EndTime
1 -a -RU - 9 -NC
2 -s -SU -5 -11
3 -d -FA -4 NA
4 -f
5 -e
6 -q
7 -v -SU -5 -6
8 -n -RU -4 NC
9 -x
10 -l
... View more
04-16-2018
10:39 PM
@p_gurav
Thanks for your response!
In this case, I am getting error like lookup name "job" does not exits. It is considering job as lookup name.
... View more
04-16-2018
10:22 PM
Hi
I am having some of the fields in my lookup file (csv file). And I want list down the lookup fields along with the search query result.
But I want my lookup fields as static and search results as dynamic.
Say Example,
I am having field A B C in my lookup file, and generating D and E from the search query result. In my dashboard/form panel A, B and C fields should be always visible. Whereas D and E are based on the search result.
My sample query,
index=XXX sourcetype=yyyy status=* job=*
| lookup dummy.csv Category
| stats latest(status) as CurrentStatus by Category job StartTime EndTime
In the above sample, Category is from lookup table job is the matching point for both lookup and search query. starttime and endtime is from the search result.
So in my dashboard Category and job values should be visible always, other field values may get updated as per the search query.
... View more
04-05-2018
08:45 PM
Hi @kamlesh_vaghela
Just wondering what this portion is performing
eval H=tonumber(strftime(now(),"%H")), NOW = if(H<5,now()-20000,now())
Could you please explain it.
... View more
02-11-2018
09:44 PM
You can the Dashboard Monitoring App from Splunk Base for better experience of data.
https://splunkbase.splunk.com/app/3350/
And follow the below post, may be fulfill your need
https://answers.splunk.com/answers/126036/case-how-to-find-the-dashboard-usage-data.html
... View more
02-11-2018
09:14 PM
| eval Domain=case(
hostname1="host1" AND computername1="host1", "NT1",
hostname1="host2" AND computername1="host2", "NT2")
Same can achieve via lookup if you have large no of values to be created.
... View more
01-02-2018
12:48 AM
You can go with a drop down option in your dashboard. Please refer the below question and its answers.
https://answers.splunk.com/answers/242704/how-can-i-create-a-drop-down-for-panels-in-a-dashb.html
... View more