Activity Feed
- Posted Re: Change Single Value Visualization Based on Text on Dashboards & Visualizations. 08-21-2024 02:07 PM
- Posted Change Single Value Visualization Based on Text on Dashboards & Visualizations. 08-18-2024 07:42 AM
- Got Karma for Re: Error - Microsoft O365 Email Add-on for Splunk App - Python error?. 08-14-2024 09:58 PM
- Posted Re: Error - Microsoft O365 Email Add-on for Splunk App - Python error? on All Apps and Add-ons. 05-11-2023 10:16 AM
- Posted How to convert multiple date formats in same field? on Splunk Search. 02-27-2023 12:59 PM
- Posted Embedded Pie Chart Needs to Show Zero Results on Dashboards & Visualizations. 02-23-2023 09:41 AM
- Karma Re: Timecharts and how to avoid "no results found inspect" for somesoni2. 02-22-2023 01:36 PM
- Posted Re: Compare results from two timeframes and show differences? on Alerting. 02-14-2023 02:41 PM
- Posted Compare results from two timeframes and show differences? on Alerting. 02-14-2023 01:51 PM
- Posted How to achieve stats count on multiple fields? on Reporting. 02-09-2023 02:53 PM
- Posted How do I refine this search to use 'my_report_date' instead of _time? on Splunk Search. 01-31-2023 04:14 PM
- Karma Re: Calculate difference between multiple fields for PickleRick. 12-06-2022 06:09 AM
- Karma Re: Calculate difference between multiple fields for PickleRick. 12-06-2022 06:08 AM
- Posted Re: Calculate difference between multiple fields on Splunk Search. 12-06-2022 05:32 AM
- Posted Re: Calculate difference between multiple fields on Splunk Search. 12-05-2022 03:04 PM
- Posted How to calculate difference between multiple fields? on Splunk Search. 12-05-2022 02:54 PM
- Karma Re: How to remove a carriage return from a field for lguinn2. 10-12-2022 07:50 AM
- Posted Re: Trouble with date conversion on Splunk Search. 09-29-2022 01:34 PM
- Posted Trouble with date conversion on Splunk Search. 09-29-2022 12:17 PM
- Posted Trouble extracting multivalue fields- How do I separate these fields into their own events? on Getting Data In. 09-27-2022 05:34 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
08-21-2024
02:07 PM
Solution: https://community.splunk.com/t5/Dashboards-Visualizations/How-to-add-background-colour-to-single-value-visualisation-based/td-p/616565
... View more
08-14-2024
09:59 PM
I'm having the same problem with the Palo Alto add-on.
... View more
02-27-2023
02:12 PM
There are plenty of ways to do this using various forms of eval. You can use if/case to match the types then convert based on match type as suggested, or you could do something like | eval date=coalesce(strptime(DateAdded, "%m/%d/%Y"), strptime(DateAdded, "%F")) which would parse each date/time until one of them converts to non-null
... View more
02-23-2023
10:46 AM
The appendpipe command usually is used in this case. | inputlookup my_lookup
| search Exposure=External
| stats count by Status
| appendpipe [ stats count as Count | eval Status="No results",count=1 | where Count=0 | fields - Count ]
| eval pie_slice = count + " " + Status
| fields pie_slice, count
... View more
02-14-2023
03:43 PM
So, Asset count * Exposure types = 68? Not sure how you get 2584 rows from that stats command. Anyway, so in your example, does the server1 row indicate that today has 1 CVE and 30 days ago there were none? How do you want to reflect 'difference'. You can try something like this ...
| stats count values(cveID) as cveID by _time AssetName Exposure
| nomv cveID
| stats list(_time) as time list(*) as * by AssetName Exposure
| eval time=strftime(time, "%F %T")
| where mvcount(cveID)=1 OR mvindex(cveID, 0)!=mvindex(cveID,1)
| table AssetName cveID Exposure count
... View more
02-09-2023
04:47 PM
That command is not a valid Splunk command What you probably want is | stats dc(AssetNames) AS TotalExternalAssets
dc(eval(if(vulnerability!="missing", AssetNames, null()))) AS TotalExposedAssets I assume the AssetNames field is the same field (not Asset_Names in the second case) This takes the count of unique assets (first dc()) and the second says If the vulnerability is not missing, then count AssetNames, otherwise count NULL (this counts as 0)
... View more
01-31-2023
05:15 PM
The earliest/latest stats commands always base early/late on the event time. What you want is simply min/max of my_report_date, which must be an epoch, so you will need to convert it first, i.e. | eval my_report_date=strptime(my_report_date, "%F")
| stats min(my_report_date) AS FirstFound, max(my_report_date) AS LastFound by my_asset %F is shorthand for %Y-%m-%d
... View more
12-06-2022
05:58 AM
1 Karma
You must have done something differently since you have different field names. So you probably hit the "if" condition which cannot perform the substraction since it doesn't have one or both of the fields defined and so you land with the "else" value which is zero. BTW, if report_date is the same as _time, you could use tstats to count the events - it would be way way faster.
... View more
09-29-2022
01:34 PM
Thank you, @richgalloway ! I see you have answered MANY questions regarding date and timestamps here - maybe it's time for you to just write a book and help us all out 🙂
... View more
09-27-2022
05:46 AM
@mistydennis Can you please try this? YOUR_SEARCH
| eval t = mvzip(mvzip(server,error),uniquekey)
| mvexpand t
| rex field=t "(?<server>.*),(?<error>.*),(?<uniquekey>.*)"
| table server error uniquekey OR YOUR_SEARCH
| eval t = mvzip(mvzip(server,error),uniquekey)
| mvexpand t
| eval server=mvindex(split(t,","),0), error=mvindex(split(t,","),1), uniquekey=mvindex(split(t,","),2)
|table server error uniquekey My Sample Search : | makeresults
| eval error="1232
2345
5783
5689
2345
5678
5901", server="server1
server2
server3
server4
server6
server9
server7"
| makemv delim="
" error
| makemv delim="
" server
| eval uniquekey=mvzip(server,error, ":")
| rename comment as "upto this is sample data"
| eval t = mvzip(mvzip(server,error),uniquekey)
| mvexpand t
| eval server=mvindex(split(t,","),0), error=mvindex(split(t,","),1), uniquekey=mvindex(split(t,","),2)
|table server error uniquekey | makeresults
| eval error="1232
2345
5783
5689
2345
5678
5901", server="server1
server2
server3
server4
server6
server9
server7"
| makemv delim="
" error
| makemv delim="
" server
| eval uniquekey=mvzip(server,error, ":")
| rename comment as "upto this is sample data"
| eval t = mvzip(mvzip(server,error),uniquekey)
| mvexpand t
| rex field=t "(?<server>.*),(?<error>.*),(?<uniquekey>.*)"
| table server error uniquekey I hope this will help you. Thanks KV If any of my replies help you to solve the problem Or gain knowledge, an upvote would be appreciated.
... View more
09-19-2022
04:38 PM
1 Karma
If you are using a lookup as a subsearch then you use "inputlookup" rather than lookup. There are three ways to solve your problem, two with subsearches 1. Search after lookup with a subsearch | inputlookup myinputlookup1
| search NOT
[ | inputlookup my_lookup
| fields my_lookup_field_matching_outer_field ] or 2. Basic Lookup | inputlookup myinputlookup1
| lookup my_lookup InLookField AS LookField OUTPUT InLookField
| where isnull(InLookField) or 3. inputlookup with where clause using a subsearch | inputlookup myinputlookup1 where NOT
[ | inputlookup my_lookup
| fields my_lookup_field_matching_outer_field ] In each subsearch case, you need to make sure that the fields returned by the subsearch are the same as the field you want to filter from the inputlookup
... View more
08-23-2022
07:04 AM
I had a feeling I was overcomplicating it - thank you so much!
... View more
08-10-2022
10:22 AM
Epoch date times start from 1970 so if you are prepared to consider 1969-12-31T23:59:59.999 as 1970-01-01T00:00:00.000, then you could use fillnull | eval newdate=strptime(lastscan,"%Y-%m-%d")
| fillnull value=0 newdate
| eval newdate=strftime(newdate,"%Y-%m-%d")
... View more
07-06-2022
12:46 PM
Figured it out. I added a new column ("mycount") in lookup2 with a "0" value for each entry. Then when I searched lookup2 against lookup1, for every row where there was no cve match between lookups, the cve was added with a "0" value. Final search: | inputlookup lookup_1
| table cveID asset Project product dueDate
| mvcombine delim=",", asset
| nomv asset
| eval numberCVEs=mvcount(split(asset,","))
| append
[ |inputlookup lookup_2
| fields q1-cveID, mycount
| eval cveID=q1-cveID ]
| dedup cveID
| eval numberCVEs=if(mycount=0, "0", numberCVEs)
| table cveID, q1-cveID asset Project product dueDate
... View more
06-21-2022
07:02 AM
One way to see what those fields contains is a create a new field like ...
| eval contains=">" . field . "<"
| ... That way it's not needed to guess what that field contains.
... View more
05-25-2022
11:46 AM
Ah, thank you somesoni2. Can you point me in the direction of documentation regarding the default option condition? I'm not seeing much in the Splunk docs and I'd like to understand it more.
... View more
05-18-2022
12:03 PM
Thank you, that got me close enough!
... View more
05-12-2022
11:36 AM
Makes sense, thanks again!
... View more
09-02-2021
01:55 PM
Hi Splunkers - We are trying to create a dashboard with conditional panels that show/hide based on token values. Easy enough. But we are also attempting to use a Submit button, and it's not working as we would like. Currently, the conditional panels are showing/hiding when a user changes the value in the dropdown input, but we would like the panels to show/hide AFTER a user has hit the submit button. Is this possible? FYI, we are not using Dashboard Studio for this particular dashboard.
... View more
09-01-2020
10:23 AM
Ah, this DID work! There was a temporary problem with our data that caused an issue. Thank you!
... View more
04-06-2020
12:51 PM
Finally figured it out. The correct timechart command was:
index=foo sourcetype="bar" realm="keywords"
| timechart span=1d distinct_count(User) by status
... View more
11-01-2019
02:26 PM
The way to handle this would be to create a new role which has all the list, get and search capabilities. Assign this role to the users
Details on the capabilities and what they do here - https://docs.splunk.com/Documentation/Splunk/7.2.1/Security/Rolesandcapabilities
Please upvote if this helps.
... View more
04-04-2019
12:50 PM
This also worked. Thanks so much, @somesoni2
... View more
03-29-2019
08:11 AM
YES! Thank you so much!
... View more