Activity Feed
- Got Karma for Re: How can we find size of events in a particular duration?. 04-19-2024 08:12 AM
- Got Karma for Re: How can we find size of events in a particular duration?. 10-18-2022 05:09 AM
- Got Karma for Re: is there a way to import local changes on SHC peers' apps back to the deployer?. 10-11-2022 01:46 PM
- Got Karma for Splunk enterprise default apps in etc apps. 08-16-2022 02:37 AM
- Got Karma for Re: How can we find size of events in a particular duration?. 01-06-2022 03:54 PM
- Got Karma for Re: How can we find size of events in a particular duration?. 11-19-2021 08:44 AM
- Got Karma for Re: How can we find size of events in a particular duration?. 03-10-2021 03:57 PM
- Got Karma for Re: is there a way to import local changes on SHC peers' apps back to the deployer?. 08-26-2020 08:37 AM
- Karma Re: Splunk enterprise default apps in etc apps for jaxjohnny2000. 07-23-2020 04:40 AM
- Karma Re: Splunk enterprise default apps in etc apps for richgalloway. 06-05-2020 12:50 AM
- Karma Re: Problem to use ML toolkit "apply" command in ES correlation search for kchamplin_splun. 06-05-2020 12:50 AM
- Karma Re: Home app: Apps panel style for diogofgm. 06-05-2020 12:50 AM
- Karma Re: is there a way to import local changes on SHC peers' apps back to the deployer? for gcusello. 06-05-2020 12:50 AM
- Got Karma for Splunk enterprise default apps in etc apps. 06-05-2020 12:50 AM
- Got Karma for Splunk enterprise default apps in etc apps. 06-05-2020 12:50 AM
- Got Karma for Re: How to dynamically add results / correlate in a search with a sub-search. 06-05-2020 12:50 AM
- Got Karma for Re: How can we find size of events in a particular duration?. 06-05-2020 12:48 AM
- Got Karma for Re: How can we find size of events in a particular duration?. 06-05-2020 12:48 AM
- Posted Re: WinEventLog whitelisting by SourceName not working on Getting Data In. 06-04-2020 02:17 AM
- Posted Re: Background color in navbar is gone in 7.1 and 7.2 on Dashboards & Visualizations. 03-04-2020 06:14 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
3 |
06-04-2020
02:17 AM
Whitelisting for Wineventlog is a little bit tricky.
First of all you can whitelist only with these fields:
Category, CategoryString, ComputerName, EventCode, EventType, Keywords,
LogName, Message, OpCode, RecordNumber, Sid, SidType, SourceName,
TaskCategory, Type, User
Then the logic behind differen whitelist rules is like this:
whitelist OR whitelist1 OR whitelist2 OR .... OR whitelistN
where each whitelist rule logic is like this
rule1 AND rule2 AND ... AND ruleN
Here a concrete example:
whitelist = EventCode="4624|4625"
whitelist1 = SourceName="AD FS Auditing"
whitelist2 = Keywords="Audit Success" User="Bob Marley"
This translates to:
EventCode="4624|4625" OR SourceName="AD FS Auditing" OR (Keywords="Audit Success" AND User="Bob Marley")
... View more
03-04-2020
06:14 AM
This is my solution:
If you inspect the navbar you will se that its div element contains a attribute data-view="/views/shared/appbar/Master"
Whereas the buttons contains data-view="/views/shared/appbar/Button"
Thats it! simply use attribute selector of CSS
if you create a dashboard.css file under /appserver/static it will apply to every dashboard (even if it is not html), otherwise if you want to use the css only in some dashboards use the attribute stylesheet=".css" in the form or dashboard element of the xml.
To customize the navbar color write the following:
[data-view*="views/shared/appbar/Master"]{
background: <YOUR DESIRED COLOR HERE>;
}
[data-view*="views/shared/appbar/Button"]{
color: <YOUR DESIRED COLOR HERE>;
}
Simply find the data-view element you want to customize and create a css rule.
... View more
10-11-2019
01:54 AM
2 Karma
Grazie, sarebbe però una bomba se il processo di riportare le custom apps al deployer fosse una feature di splunk, è un po' una menata doverlo fare a mano, e dover fare il merge nel default di ciò che hai configurato in local.
... View more
10-09-2019
07:56 AM
Dear comunity,
I would like to maintain the search peers' status of every app in the deployer, and not on search peers' local folder.
I really like to have every single configuration and app in the deployer's shcluster folder. For custom apps I always put everything in the default folder.
The problem is that customizations or new features made via splunk-web are NOT reflected in the shcluster folder of the deployer, instead, they are only present in the cluster's peers local folder.
Since I have hundreds of custom apps, my current idea to do this is to write a program that checks the difference between deployer's stanzas and the related stanzas on the search peers (using btool to get the actually used configurations) , and then merges them (for custom apps I will then put this merge in the default folder).
Does anybody have a better idea?
... View more
09-17-2019
04:16 AM
Check your escape characters, some working using the rex command does not work in conf files. for example backslashes.
Check this post
... View more
08-26-2019
01:51 AM
Dear Splunk comunity,
I attached a Image found on dev.splunk that shows a nice App panel with colors and a cool layout.
I searched on google and Splunk websites on how to change the apps panel layout but I could not find anything related.
Is this a Splunk interface option or should I customize the home app with a css?
Thank you
... View more
- Tags:
- splunk-enterprise
07-10-2019
05:38 AM
7 Karma
Very simple, by default splunk raw events are in UTF-8 format. This means that each character is 8 bits (one byte).
So you do this:
your initial search
| eval eventSize = len(_raw)/1024/1024/1024
the first division by 1024 gives you KiloBytes, the second division MegaBytes and the third GigaBytes and so on
Dont forget to upvote if you found this useful
... View more
07-10-2019
05:28 AM
1 Karma
You are looking for the join command, i.e:
index=test
| table Computer
| join Computer [ search (index=another_test) | head 1 | table Name Computer]
This correlates the Computer field both on index test and another_test and join the subsearch fields (except for the matching one).
Dont forget to upvote 🙂
... View more
07-10-2019
05:19 AM
No, I am talking by experience.
As partner you have discounts (using tokens), but the course is not free.
Please upvote if you find this answer useful.
... View more
07-10-2019
05:14 AM
You did the correct think to inherit role can_delete and admin capabilities.
Maybe the changes did not go in memory so try this:
Go in $SPLUNK_HOME/bin
From the terminal/console on the SH: ./splunk reload auth (for windows .\splunk reload auth)
pipe the delete command on your search
This command reloads the authorizations of splunk.
Let me know if that worked, and give me a upvote if you find this
... View more
06-04-2019
06:41 AM
I drilled down in splunk answers and i found This anwer from muebel.
https://answers.splunk.com/answers/509868/commands-not-usable-from-enterprise-security.html
The answer from muebel resolved my problem.
ES has a modular input to control what is allowed in the app context. Just add the ML toolkit in the allowed imports.
... View more
06-04-2019
05:50 AM
I want to use a ML toolkit trained model in Enterprise security.
To do this I want to use the "apply" command in a correlation search, which should use the trained model.
THe model is shared globally, the "apply" command is also shared globally.
When I save the new correlation search I get an error that says that the "apply" command was not found.
Any Idea why this happens?
... View more
06-03-2019
02:26 AM
savage_clowns killed me 😄 nice
... View more
05-31-2019
07:51 AM
I had a very similar situation andI realized that some collections were HUGE (in the range of 100 GB), this may cause the mongodb to start very slowly.
I searched in mongodb.log for errors, especially when mongodb starts.
There was not much in there except for some problems while trying to update mongodb to the new version.
I believe that due to its huge size, the service takes too long to starts and goes in conflict with its updates or splunk itself and at the end splunk starts anyway without having the KVstore running.
This is what worked for me, CAREFUL the data will be DELETED from the kvstore, see point [1] if you want to backup the data, but since you are not using it you can just do the clean:
1) Stop the search head that has the stale KV store member.
2) Run the command splunk clean kvstore --local.
3) Restart the search head.
4) Run the command splunk show kvstore-status to verify.
see
https://docs.splunk.com/Documentation/Splunk/7.2.6/Admin/ResyncKVstore
[1] If you have important data and you dont want to lose it, do a backup and restore
https://docs.splunk.com/Documentation/Splunk/7.2.6/Admin/BackupKVstore
I hope this helps
... View more
05-31-2019
07:22 AM
Open the firewall to the UFs on the new DS
On the UFs, change the $SPLUNK_HOME/etc/system/local/deploymentclient.conf to the following:
[target-broker:deploymentServer]
targetUri=(your new DS REST URI identifier)
[deployment-client]
clientName=(your UF client name)
Restart the UF
When you finish, launch splunk reload deploy-server on the DS
The best way to do this on many hosts is to use a server automation tool such as bladelogic or to do it directly via global shell or something similar.
... View more
05-17-2019
05:56 AM
Thank you, this is what I did, i posted this just in case other splunkers are thinking about that.
Cheers!
... View more
05-17-2019
12:47 AM
Are you aliasing those fields later?
If you alias fields in the props.conf file and you use for example:
FIELDALIAS- = (orig_field_name AS|ASNEW new_field_name)
In case you use AS, if the original fieldname is not found splunk deletes the new fieldname, so if for some reason a event does not contain it, it would delete the new, to fix this problem, use ASNEW.
When these problem happens my approach is to read the .conf documentation
... View more
05-17-2019
12:34 AM
3 Karma
Dear Splunk community,
I searched for a list of default apps that ships with the enterprise package, but there is not a list of them.
such as:
- alert_logevent
- alert_webhook
- appsbrowser
- framework
- gettingstarted
- introspection_generator_addon
- launcher
- learned
- legacy
- sample_app
- search
- Splunkforwarder
- SplunkLightForwarder
- splunk_gdi
- splunk_httpinput
- splunk_instrumentation
- splunk_monitoring_console
- user-prefs
These are the ones that I believe are shipped by default with enterprise, am I missing some?
Thanks community!
... View more
04-17-2019
04:19 AM
In my case what worked is the answer from @somesoni2
your base search | extract reload=t
Sometimes things does not update even if you reload splunk.
Another fact about field extraction is that it takes some minutes for fields to show up, in this case just wait some minutes until you see the fields.
... View more