Activity Feed
- Got Karma for Re: How can I customize my chart to show labels instead of number values and to be color-coded?. 06-05-2020 12:49 AM
- Got Karma for Splunk DB Connect 2: After moving from standalone search heads to a search head cluster, getting errors "BadStatusLine" and "Connection Refused". 06-05-2020 12:48 AM
- Got Karma for Splunk DB Connect 2: After moving from standalone search heads to a search head cluster, getting errors "BadStatusLine" and "Connection Refused". 06-05-2020 12:48 AM
- Got Karma for Re: Splunk DB Connect 2: After moving from standalone search heads to a search head cluster, getting errors "BadStatusLine" and "Connection Refused". 06-05-2020 12:48 AM
- Got Karma for Shared search for ITSI and glass panel. 06-05-2020 12:48 AM
- Got Karma for Re: how do you encrypt app passwords in a search head cluster. 06-05-2020 12:47 AM
- Posted Re: How can I customize my chart to show labels instead of number values and to be color-coded? on Splunk Search. 08-18-2017 09:01 AM
- Posted How can I customize my chart to show labels instead of number values and to be color-coded? on Splunk Search. 08-16-2017 11:30 AM
- Tagged How can I customize my chart to show labels instead of number values and to be color-coded? on Splunk Search. 08-16-2017 11:30 AM
- Tagged How can I customize my chart to show labels instead of number values and to be color-coded? on Splunk Search. 08-16-2017 11:30 AM
- Tagged How can I customize my chart to show labels instead of number values and to be color-coded? on Splunk Search. 08-16-2017 11:30 AM
- Posted Re: Index File Daily on Deployment Architecture. 02-10-2017 05:16 AM
- Posted Index File Daily on Deployment Architecture. 02-09-2017 07:51 AM
- Tagged Index File Daily on Deployment Architecture. 02-09-2017 07:51 AM
- Posted Re: Splunk DB Connect 2: After moving from standalone search heads to a search head cluster, getting errors "BadStatusLine" and "Connection Refused" on All Apps and Add-ons. 02-02-2017 04:27 AM
- Posted Re: how do you encrypt app passwords in a search head cluster on All Apps and Add-ons. 01-26-2017 01:03 PM
- Posted Re: Add-on for JIRA: Why does Splunk populate "jirarest" search, but when the search is run, it returns error "Unknown search command 'jirarest'"? on All Apps and Add-ons. 01-16-2017 06:57 AM
- Posted Add-on for JIRA: Why does Splunk populate "jirarest" search, but when the search is run, it returns error "Unknown search command 'jirarest'"? on All Apps and Add-ons. 01-12-2017 01:56 PM
- Tagged Add-on for JIRA: Why does Splunk populate "jirarest" search, but when the search is run, it returns error "Unknown search command 'jirarest'"? on All Apps and Add-ons. 01-12-2017 01:56 PM
- Tagged Add-on for JIRA: Why does Splunk populate "jirarest" search, but when the search is run, it returns error "Unknown search command 'jirarest'"? on All Apps and Add-ons. 01-12-2017 01:56 PM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
1 | |||
2 | |||
0 | |||
0 | |||
0 | |||
0 |
08-18-2017
09:01 AM
1 Karma
I was able to use something very close to this, but also had to use multiseries to get it display exactly how I wanted. Thanks
... View more
08-16-2017
11:30 AM
I have a service which we need to monitor discrete states. I only get events if the state changes. I can map these states (e.g. error, init, pending, standby, hot) to numerical values and then graph them on a timechart. With the filldown command I can also maintain the current state to produce a graph that shows the current state at any given time.
What I would like to do next is map those numerical values and provide some content. Ideally it would be to replace the y-axis so that instead of -1 through 3 it would display the states as text. Other options that would also work would be to color each column a different color based on the state (for example, make the column chart turn red when it is in an error state), or provide a legend that would make it easier to read. Basically I want someone to be able to look at the timechart and say at a given time what the state was without wondering what a 0, 1, 2 or 3 means.
This is what I have thus far:
Also, if it gets me the desired effect I could also break it down so RCS, Realtime, and isps do not appear on the same panel but ideally would like to have that functionality as well.
Any ideas that might help on this.
Splunk 6.6.1
... View more
02-10-2017
05:16 AM
Thanks, that helped. I think I was mostly confused about where I put the CHECK_METHOD.
... View more
02-09-2017
07:51 AM
I have some files that I need to index daily even though they may not change in content for several days (for example over weekends). The files are generated daily so they have a new creation and modification time. How can I force splunk to automatically index the file daily or use something like creation or modification time?
... View more
02-02-2017
04:27 AM
1 Karma
This seems to be resolved with the latest version of Splunk and DBConnect
... View more
01-26-2017
01:03 PM
1 Karma
Also even though Setup does not show up on Manage Applications on the SHC, you can take the URL and still run it on SHC.
Normally the URL will be of this form:
/en-US/manager/splunk-add-on-jira-alerts/apps/local/splunk-add-on-jira-alerts/setup?action=edit
I was able to edit my config by using this URL and then the encrypted password was replicated across all members.
... View more
01-16-2017
06:57 AM
Thanks - I hadn't noticed that. There was an app update over the weekend that depreciates those too.
... View more
01-12-2017
01:56 PM
We recently installed the Add-on for JIRA and followed the instructions. Everything seems normal and when I opened my Splunk to do the search I can type | jirarest and I see Splunk 6.5 wants to autocomplete the rest of the statement with the following:
| jirarest jqlsearch "Reporter=Bob Smith'
Since it provides an actual field for Reporter that matches one of our employees, it would seem to indicate that it can access my JIRA instance, however when I run the actual command it says-
Search Factory: Unknown search command 'jirarest'.
I have ensured the permissions are correct for my user account. Any idea of the problem?
Splunk Enterprise 6.5.1, Add-on for JIRA 2.2.0
CentOS7
Running on a dedicate search head
... View more
11-04-2016
07:55 AM
Hello,
We have installed the app on a heavy forwarder. configured the input Object Name field with 1.1
Now, we are receiving data in from the poll, but we can't tell what it all really means.... should it convert to a more readable format?
... View more
07-25-2016
05:59 AM
Sorry I was not clear about what a system is or what service is.
System: 4 - 8 hosts which are part of a common system
Service: I mean a Windows Service here not the ITSI service (just to be clear)
Based on this I don't think your first solution will work; however, I might be able to define a metric based on the base KPI search. I will try that and let you know the results.
... View more
07-24-2016
05:45 PM
1 Karma
We have recently implemented ITSI into our environment and are building a glass panel which displays the current state of multiple services running on a system. In our case we have about 16-20 services we monitor on each system and about 8 systems. If I used a regular dashboard I could use a base search to power all the panels with 2 or 3 base searches thus reducing load on the system (in terms of # searches). A regular dashboard's layout is too restrictive so we were hoping to do this with glass panels.
I was curious if this was possible in ITSI and how you would implement this?
... View more
05-24-2016
01:59 PM
2 Karma
We are having issues since we moved from Standalone Search Heads to Clustered Search Heads. Often when we run searches, we get one of the following errors:
BadStatusLine
Connection refused
This runs fine on a standalone machine with the same libraries that we have previously used before moving to the search head cluster. I deployed the app per the documentation (via the Search Head Cluster) and I am positive passwords and such are fine.
Anyone run into this problem and found a fix?
Splunk: 6.4.1
DbConnect 2.2.0
... View more
11-20-2015
06:42 AM
This turned out to be my problem but the error message was misleading because it seemed to indicate the problem was on the Indexers where I had already cleared out the extra lookup files, but it was actually an issue on my search head.
... View more
11-01-2015
05:00 AM
I have created a dashboard that has a few filters on it which are used to retrieve specific rows from the MSSQL database. I have managed to substitute the filters into the query, except a timepicker filter is proving more difficult. I want to restrict the query results to the range selected in the time picker rather than retrieving all the data and filtering it afterwards. Ideas on how to do this (besides indexing the data)?
I could use either epoch time or a datetime.
Splunk 6.3
DBConnect v1.2.1
... View more
09-02-2015
06:14 AM
That is what I thought might be a solution, but wasn't sure if there was anything built in natively with Universal Forwarder.
Thanks! I will see if anyone else has any good ideas before marking accepted.
... View more
09-02-2015
05:28 AM
I am trying to determine if there is a way for the Splunk Universal Forwarder to monitor environmental variables. We have an in-house application that uses a particular one to determine whether a service should be actively running certain processes (i.e. the service should only run the process if it is flagged as the active server). Is there a way for the Universal Forwarder to monitor these values?
Ideally what I am shooting for is to send an alert when it changes from active to standby (or vice versa).
... View more
07-07-2015
09:55 AM
We have a file being generated by a vendor that they write data to on a regular basis. I do not need to import the data in the file directly into splunk, but need to monitor the timestamp of the last modified date (Windows system). Based on the documentation they provided me, this file serves also as a checkin file and if the file is not being updated within a certain amount of time it means a critical component is down. What ways can you monitor this last modified date in Splunk? As stated my preference is not have to import the file contents.
Splunk 6.2.3
... View more
06-18-2015
06:24 AM
I ended up having to tweak this a little, but this pointed me in the right direction. Thanks
... View more
06-15-2015
10:08 AM
Thanks woodcock - it looks like this might be the solution. I am going to be doing some testing but from the initial testing I have done so far it seems to have solved my problem. Once I am sure, I'll mark it answered.
... View more
06-15-2015
06:51 AM
We have some critical services we are monitoring on a realtime system so responding in a timely manner is essential. If the services stop we need to be notified. Currently we monitor this with WinHostMon and when one of the services stops we sent out an email indicating it has stopped.
Sometimes but not always an event will get logged indicating one of these same services has stopped by a particular user from a certain machine (usually from program interface). These events come in via the application event log. We don’t alert on this currently.
Want:
We want to be able to incorporate this information into a single alert to do the following:
1. If a user stops the service, send an email that includes the user and source machine
2. If the service stops in another manner (for example through the control panel) where there is no specific user - still send the alert, but just put the user and source machine info as unknown.
What I have tried:
Did a left join (left side is monitoring the WinHostMon) and if user and source machine are included go ahead and send it or default to Unknown (using fillnull)
Problem:
I get the alert but sometimes it doesn’t include a username and source user and sometimes it does. I think this is a timing issue as I sometimes see two events show up, one with the default Unknown user and a second with the right info (extractions for these fields have already been set up and working). Currently the alert to set up to run under a cron job 1/minute and the WinHostMon watches the services every 30 seconds.
The following is a example of what I have tried that sometimes works and sometimes does not:
Type=Service service_name="Critical Service to Watch" State="Stopped" | dedup service_name,host | join type=left service_name,host [ search index=wineventlog Message="Shutdown of the * service on computer * requested by user *" service_name="Critical Service to Watch" | fields host,message,service_name,source_machine,user] |fillnull value=Unknown source_machine,message,user | fields host,Name,service_name,source_machine,message,user
Splunk 6.2.3.
I am not sure what is best way to handle this, perhaps some kind of lookup that when it sees someone stop the service append it to the log and when the service starts it removes this entry from the lookup file?
Anyone have any other ideas?
... View more