Activity Feed
- Posted Re: indexaccess on appcontext basis on Splunk Enterprise. 2 weeks ago
- Posted indexaccess on appcontext basis on Splunk Enterprise. 2 weeks ago
- Tagged indexaccess on appcontext basis on Splunk Enterprise. 2 weeks ago
- Tagged indexaccess on appcontext basis on Splunk Enterprise. 2 weeks ago
- Tagged indexaccess on appcontext basis on Splunk Enterprise. 2 weeks ago
- Tagged indexaccess on appcontext basis on Splunk Enterprise. 2 weeks ago
- Posted Re: Modulus in Splunk is faulty in my occasion on Splunk Search. 02-26-2025 11:20 PM
- Posted Modulus in Splunk is faulty in my occasion on Splunk Search. 02-26-2025 06:41 AM
- Tagged Modulus in Splunk is faulty in my occasion on Splunk Search. 02-26-2025 06:41 AM
- Posted Re: Search usage of Indexes on Splunk Search. 12-10-2024 12:04 AM
- Karma Re: Search usage of Indexes for bowesmana. 12-10-2024 12:04 AM
- Posted Re: Search usage of Indexes on Splunk Search. 12-09-2024 06:15 AM
- Posted Re: Search usage of Indexes on Splunk Search. 12-08-2024 10:31 PM
- Posted Search usage of Indexes on Splunk Search. 12-06-2024 06:01 AM
- Tagged Search usage of Indexes on Splunk Search. 12-06-2024 06:01 AM
- Tagged Search usage of Indexes on Splunk Search. 12-06-2024 06:01 AM
- Karma Re: Multiple Inputs on the same File for gcusello. 08-29-2024 12:40 AM
- Posted Re: Multiple Inputs on the same File on Getting Data In. 08-29-2024 12:36 AM
- Posted Re: Multiple Inputs on the same File on Getting Data In. 08-29-2024 12:17 AM
- Posted Multiple Inputs on the same File on Getting Data In. 08-28-2024 11:59 PM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
1 | |||
0 | |||
0 | |||
0 |
2 weeks ago
Hi splunkers, is it possible to restrict indexaccess to specific appcontext? like a user has read access to app a and write access to app b app a has dashboards on index a inside app b has dashboards on index b but searching through index a is not allowed inside app b because we have built a firewall selfservice, where people can check if their connection get blocked by firewall and if so, they can open a ticket by one click. Now we encounter some usergroups that want to be able to search on their own in their own app. With this, they currently could freely search and analyse our firewall data beyond checking if their connection gets blocked or not. How can we achieve accesscontrol like this if its even possible? Thanks in advance!
... View more
Labels
02-26-2025
11:20 PM
I tested further and its not the modulus calculation, its how splunk handling high numbers. This search shows that if a number (only tested Integer) has 17 digits or more, odd numbers will turned even. The field odd_highest_correct_len_16 in the makeresults search is the highest correct odd i achieved whith working digit for digit from left to right. If the last digit of odd_highest_correct_len_16 is get set to 3, splunk will make a 2 out of that. | makeresults
| fields - _time
| eval odd_correct_len_16=1000000000000001, odd_highest_correct_len_16=9007199254740991, odd_incorrect_len_17=10000000000000001 I'm going to file a support case for that.
... View more
02-26-2025
06:41 AM
Hi fellow splunkers, recently i deployed WinPrintMon inputs to our printserver, to check driver versions and found out that splunk falsly calculated modulus. Tested in Enterprise 9.3.2 and 9.4.0 in the calculated version i found out, that the revision of a driver differs from the printmanagement on that printserver directly. i calculate the revision like that: version % pow(2,16) In my case the calculation translates to 17171305019303231 % 65536 splunk calculates 25920 which isn't correct, it is 25919
... View more
Labels
- Labels:
-
eval
12-10-2024
12:04 AM
This is the SPL Magic i was missing 🙂 Now i can have a basic understanding which indexes might be searched less frequently than others
... View more
12-09-2024
06:15 AM
What do you mean with that? i didnt meant to ask my question in a way that i would want to replace docs and management with tools.
... View more
12-08-2024
10:31 PM
Sorry i probably didnt expressed myself well. i want that wildcards gets taken into account. So based from the table i posted as example i would want results like this title totalEventCount frozenTimePeriodInSecs NumOfSearches _audit 771404957 188697600 23348 (_audit + _*) _configtracker 717 2592000 22311 (_configtracker + _*) _internal 7039169453 15552000 24098 (_internal + _*)
... View more
12-06-2024
06:01 AM
Hi there im currently at a search to get the usage of Indexes, so i have an overview which indexes gets used in searches and which indexes doesnt so i can speak with the usecase owner if the data is still needed and why it doesnt get used. Thats the current state of the search: | rest "/services/data/indexes"
| table title totalEventCount frozenTimePeriodInSecs
| dedup title
| append
[search index=_audit sourcetype="audittrail" search_id="*" action=search earliest=-24h latest=now
``` Regex Extraction ```
| rex field=search max_match=0 "index\=\s*\"?(?<used_index>\S+)\"?"
| rex field=search max_match=0 "\`(?<used_macro>\S+)\`"
| rex field=search max_match=0 "eventtype\=\s*(?<used_evttype>\S+)"
``` Eventtype resolving ```
| mvexpand used_evttype
| join type=left used_evttype
[| rest "/services/saved/eventtypes"
| table title search
| stats values(search) as search by title
| rename search as resolved_eventtype, title as used_evttype]
| rex field=resolved_eventtype max_match=0 "eventtype\=\s*(?<nested_eventtype>\S+)"
| mvexpand nested_eventtype
| join type=left nested_eventtype
[| rest "/services/saved/eventtypes"
| table title search
| stats values(search) as search by title
| rename search as resolved_nested_eventtype, title as nested_eventtype]
``` Macro resolving ```
| mvexpand used_macro
| join type=left used_macro
[| rest "/servicesNS/-/-/admin/macros" count=0
| table title definition
| stats values(definition) as definition by title
| rename definition as resolved_macro, title as used_macro]
| rex field=resolved_macro max_match=0 "\`(?<nested_macro>[^\`]+)\`"
| mvexpand nested_macro
| join type=left nested_macro
[| rest "/servicesNS/-/-/admin/macros" count=0
| table title definition
| stats values(definition) as definition by title
| rename definition as resolved_nested_macro, title as nested_macro]
| where like(resolved_nested_macro,"%index=%") OR isnull(resolved_nested_macro)
``` merge resolved stuff into one field ```
| foreach used* nested*
[eval datasrc=mvdedup(if(<<FIELD>>!="",mvappend(datasrc, "<<FIELD>>"),datasrc))]
| eval datasrc=mvfilter(!match(datasrc, "usedData"))
| eval usedData = mvappend(used_index, if(!isnull(resolved_nested_eventtype),resolved_nested_eventtype, resolved_eventtype), if(!isnull(resolved_nested_macro),resolved_nested_macro, resolved_macro))
| eval usedData = mvdedup(usedData)
| table app user action info search_id usedData datasrc
| mvexpand usedData
| eval usedData=replace(usedData, "\)","")
| where !like(usedData, "`%`") AND !isnull(usedData)
| rex field=usedData "index\=\s*\"?(?<usedData>[^\s\"]+)\"?"
| eval usedData=replace(usedData, "\"","")
| eval usedData=replace(usedData,"'","")
| stats count by usedData
] The search first gets the indexes via | rest with its eventcount and retentiontime. Then audittrail data gets appended and used Indexes, Macros and Eventtypes gets extracted from the searchstring and resolved (since some apps uses nested eventtypes/macros in my environment they get resolved twice). Still needs some sanitizing of the extracted used-indexes. that gives me a table like this (limited the table to splunkinternal indexes as example) title totalEventCount frozenTimePeriodInSecs count usedData _audit 771404957 188697600 _configtracker 717 2592000 _dsappevent 240 5184000 _dsclient 232 5184000 _dsphonehome 843820 604800 _internal 7039169453 15552000 _introspection 39100728 1209600 _telemetry 55990 63072000 _thefishbucket 0 2419200 22309 _* 1039 _audit 2 _configtracker 1340 _dsappevent 1017 _dsclient 1 _dsclient] 709 _dsphonehome 2089 _internal 117 _introspection 2 _metrics 2 _metrics_rollup 2 _telemetry 2 _thefishbucket But i didnt managed to merge the rows together so that i have count=1039 for _audit plus the 22309 from searches that uses all internal indexes in one row for each index.
... View more
08-29-2024
12:36 AM
Alright Thank you i will use sourcetype and index overriding and then make the data of the newly added available for our qs cluster to build dashboards
... View more
08-29-2024
12:17 AM
Hi @gcusello thanks for the fast response. if im not wrong i theoretically could bypass the precedence by doing this (at least btool dont complain) but i will not do that [monitor://<path to logfile>.log]
...
[monitor://<path to same logfile>.lo*]
... When overriding sourcetype and index on the indexer, am i able to route data of the second sourcetype to our qs cluster to build dashboards?
... View more
08-28-2024
11:59 PM
Hi there, i have a file monitoring stanza on a universal forwarder where i filter using transforms.conf to only get logentries i need, because the server writes logentries of multiple business processes into the same logfile. Now i need entries of another process with different ACL in a different index from that logfile but in our QS cluster while the first datainput still ingests into our PROD cluster So i have my inputs.conf [monitor://<path_to_logfile>]
disabled = 0
index = <dataspecific index 1>
sourcetype = <dataspecific sourcetype 1> a props.conf [<dataspecific sourcetype 1>]
SHOULD_LINEMERGE = true
BREAK_ONLY_BEFORE_DATE = true
TRUNCATE = 1500
TIME_PREFIX = ^
MAX_TIMESTAMP_LOOKAHEAD = 20
TIME_FORMAT = [%y/%m/%d %H:%M:%S]
TRANSFORMS-set = setnull, setparsing and a transforms.conf [setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue
[setparsing]
REGEX = (<specific regex>)
DEST_KEY = queue
FORMAT = indexQueue As standalone Stanza i would need the new input like this, with its own setparsing transforms [monitor://<path_to_logfile>]
disabled = 0
index = <dataspecific index 2>
sourcetype = <dataspecific sourcetype 2>
_TCP_ROUTING = qs_cluster to be honest i could just create a second stanza thats a little different and still reads the same file, but i dont want two tailreader on the same file. What possibilities do i have? Thanks in advance
... View more
Labels
06-24-2024
07:44 AM
Hi there, for better visibility i built a dashboard for indexer restarts, this dashboard is based on the _internal index and the /var/log/messages from the indexers themself. I would like to add the Info how the restart was triggered. so i can see whether the restart came from the manager (WebUI: Configuration Bundle Actions) or was done via the cli. Does Splunk log this? If yes where do i find that info? Thanks in advance!
... View more
Labels
- Labels:
-
indexer
04-26-2024
12:31 AM
As Workaround i now used CSS to hide the "View on Mobile" button. .view-mobile { display: none !important; }
... View more
04-25-2024
11:40 PM
Thank you, found the authentication.conf with LDAP Configuration on our indexers
... View more
04-25-2024
07:08 AM
Hi, i have a question on Authenticating to IDX Cluster Peer via REST. We have the following Environment: 3 IDX in Cluster 3 SH in Cluster 1 CM (License Manager, IDX Cluster Manager, Deployer & Deploymentserver) Our normal Authentication for Web is currently with LDAP. With my LDAP-User i can directly perform a GET request to an Indexer, but with a local User created over WebUI (tried local user in SHC and on CM) i cant perform any request to an indexer. The WebUI is disabled on the Indexers and they dont have the LDAP Configuration as the Searchheads does. How does it come, that the Indexer know my LDAP User but not the locally created? And how can i let the indexers to get to know a locally on SH or CM created user?
... View more
Labels
- Labels:
-
configuration
-
development
-
troubleshooting
Hi fellow Splunkers, i recently came across an authentication Token created by splunk-system-user and i had no clue where this token came from and my splunkadmin colleagues didnt created the token either. Is it a feature/normal that Splunk will generate a Token every single time you click on "view on mobile" from the menu of a xml dashboard? Can we turn it off? We dont want users to be able to freely create an infinite amount of authentication tokens, because it would make overview of tokens way harder and we dont have configured the secure gateway.
... View more
Labels
- Labels:
-
access control
-
authentication
12-22-2023
02:37 AM
We have that false positives lately too and we found out with helkp of the following search that our peers ran into authTokenConnectionTimeout which defaults to 5 seconds authTokenConnectionTimeout is located in distsearch.conf index=_internal (GetRemoteAuthToken OR DistributedPeer OR DistributedPeerManager) source!="/opt/splunk/var/log/splunk/remote_searches.log"
| rex field=_raw "Peer:(?<peer>\S+)"
| rex field=_raw "peer: (?<peer>\S+)"
| rex field=_raw "uri=(?<peer>\S+)"
| eval peer = replace(peer, "https://", "")
| rex field=_raw "\d+-\d+-\d+\s+\d+:\d+:\d+.\d+\s+\S+\s+(?<loglevel>\S+)\s+(?<process>\S+)"
| rex field=_raw "\] - (?<logMsg>.+)"
| reverse
| eval time=strftime(_time, "%d.%m.%Y %H:%M:%S.%Q")
| bin span=1d _time
| stats list(*) as * by peer _time
| table peer time loglevel process logMsg
... View more
11-22-2023
02:47 AM
Hello @Stives , How does your Inputstanza looks like? If no crcSalt is specified in the stanza, Splunk will look into the first (i think 256) Bytes of a file and determines based on that if it already know the File. If the first Bytes in the CSV files will always be the same you could change your inputstanza and add crcSalt = <SOURCE> docs to monitoring stanza for a deeper look into crcSalt: https://docs.splunk.com/Documentation/Splunk/9.1.2/Admin/Inputsconf#MONITOR: But be cautious, this will tell splunk to watch for the full path to determine if this file is already been indexed, so there is a possibility that you index the same file twice. Especially for Directories with rolling logfiles. Other possibility could be that the dates are out of the retention time scope. (If the files got indexed once but due to retention time got removed again when its bucket is not hot anymore)
... View more
08-11-2023
03:07 AM
Did the blacklist/whitelist got replaced by denylist/allowlist in Splunk 9? In some Blogs i read that Splunk 9 replaced blacklist with denylist? Or is blacklist still usable? In the Changelogs of Splunk 9 i didnt found any evidence for the change, but the Splexicon and some Blogs say something different. https://docs.splunk.com/Splexicon:Denylist https://www.splunk.com/en_us/blog/leadership/biased-language-has-no-place-in-tech-a-follow-up.html?locale=en_us Thanks for explanation 🙂
... View more
Labels
- Labels:
-
blacklist
-
inputs.conf
-
whitelist
08-08-2023
02:50 AM
1 Karma
I just found an imo ugly Workaround for that. Basically its not directly postprocessing search. Its using the SID of the basesearch and loads it using | loadjob with the "postprocessing" query, that creates an own SID for the further search, that can be used to export the results. But i have no clue how its differs to postprocessing searches in terms of performance/resource usage <form theme="dark" version="1.1">
<label>test</label>
<search id="baseSearch">
<query>
index="test"
| table A B C D E F _time
</query>
<earliest>-7d@d</earliest>
<latest>now</latest>
<done>
<set token="job_to_exportTocsv">$job.sid$</set>
</done>
</search>
<row>
<panel>
<html depends="$job_exportTocsv$">
<a target="_blank" class="btn" href="/api/search/jobs/$jobexportTocsv$/results?isDownload=true&maxLines=0&count=0&filename=csv_export&outputMode=csv" role="button">CSV Export</a>
</html>
<table>
<search>
<query>
| loadjob $job_to_exportTocsv$
| stats count by A
| addinfo
</query>
<done>
<set token="job_exportTocsv">$job.sid$</set>
</done>
</search>
<option name="drilldown">none</option>
<option name="refresh.display">progressbar</option>
</table>
</panel>
</row>
</form>
... View more
03-15-2023
02:46 AM
Oh, I didnt knew that. Where is that info? In the Docs Define tokens for conditional operations with form inputs i cant find that info.
... View more
03-15-2023
12:17 AM
1 Karma
@annisha26 You can easily do that with the following: <input type="multiselect" token="panelTok" searchWhenChanged="true">
<label>select Panels to show</label>
<choice value="1">Entry1</choice>
<choice value="2">Entry2</choice>
<choice value="3">Entry3</choice>
<choice value="4">Entry4</choice>
<change>
<eval token="DisplayPanel1">if(isnull(mvfind($panelTok$, "1")),null(),true())</eval>
<eval token="DisplayPanel2">if(isnull(mvfind($panelTok$, "2")),null(),true())</eval>
<eval token="DisplayPanel3">if(isnull(mvfind($panelTok$, "3")),null(),true())</eval>
<eval token="DisplayPanel4">if(isnull(mvfind($panelTok$, "4")),null(),true())</eval>
</change>
</input>
... View more
03-14-2023
12:58 AM
Hello Splunk Community, to get into ReactJS and the Splunk UI-Toolkit i created a small App with a Component, thats fetching the Splunk-Roles and the LDAP-groups from splunks REST-API for easy mapping of matching groups and roles. Fetching of the roles work, but the groups dont. Codeside i fetch against '/splunkd/services/admin/LDAP-groups?output_mode=json' That respond with 303 see other and refers to '<locale>/splunkd/services/admin/LDAP-groups?output_mode=json' where i get the 404 Page not Found response. Searching for the requestId shows following: proxy:132 - Resource not found: services/admin/LDAP-groups error:321 - Masking the original 404 message: 'Resource not found: services/admin/LDAP-groups' with 'Page not found!' for security reasons My User has the change_authentication capability, so theoretically it should work. Am i doing something wrong? Or is that endpoint denied by default if its not splunk itself?
... View more
02-27-2023
04:25 AM
Im using DBConnect 3.11.0 and cant add or change the description of Inputs via the GUI. It appears since ive upgraded from version 3.8 I can click inside the Textarea and the cursor is shown as normal, but no Keystroke is taken and i cant even delete text out of it. As workaround i`ll use config explorer with debug/refresh but i dont want to use it everytime when creating the description for a new input or changing the description of an existing input. Is this a known issue? Does anyone alse have this behavior too?
... View more
Labels
- Labels:
-
troubleshooting
-
upgrade
02-09-2023
03:04 AM
I have a similar Problem. I call a Dashboard with <URL To Dashboard>?form.dropdown1=val1&form.dropdown2=val2&form.show_panel_tok=panel1 In the called Dashboard i have ...
<init>
<eval>token="show_panel1_tok">if($form.show_panel_tok$=="panel1",true(),null())</eval>
<eval>token="show_panel2_tok">if($form.show_panel_tok$=="panel2",true(),null())</eval>
</init>
...
<panel depends="$show_panel1_tok$">
...
<panel depends="$show_panel2_tok$">
... the dropdown inputs dropdown1 and dropdown2 are showing the given value, but the evaluated tokens from init do sometimes work but mostly dont. Could it be a timing problem of splunk? If yes does anyone know a workaround?
... View more