Activity Feed
- Posted Re: date diff until on Alerting. 03-25-2024 02:02 AM
- Karma Re: date diff until for richgalloway. 03-25-2024 02:01 AM
- Posted date diff until on Alerting. 03-19-2024 09:30 AM
- Posted InputLookup to monitor data inputs on Monitoring Splunk. 12-01-2023 02:44 PM
- Tagged InputLookup to monitor data inputs on Monitoring Splunk. 12-01-2023 02:44 PM
- Karma Re: Hierarchy of organisation for danspav. 10-26-2023 04:41 AM
- Posted Hierarchy of organisation on Dashboards & Visualizations. 10-23-2023 08:48 AM
- Posted Re: Detecting CVE-2023-23397 in office content? on Splunk Search. 03-20-2023 08:15 AM
- Tagged Re: Detecting CVE-2023-23397 in office content? on Splunk Search. 03-20-2023 08:15 AM
- Posted Detecting CVE-2023-23397 in office content? on Splunk Search. 03-16-2023 09:22 AM
- Karma Re: How to pass token to input? for ITWhisperer. 08-15-2022 01:00 AM
- Posted Re: How to pass token to input? on Dashboards & Visualizations. 08-12-2022 12:51 AM
- Posted How to pass token to input? on Dashboards & Visualizations. 08-11-2022 02:30 PM
- Posted Re: Prioritise one entry over another on Splunk Search. 07-04-2022 04:25 AM
- Posted How to prioritize one entry over another in search? on Splunk Search. 07-02-2022 06:05 AM
- Posted Re: Local Authentication to the ACS API on Splunk Dev. 01-15-2022 09:39 AM
- Posted Re: Forwarding ID on Splunk Cloud Platform. 01-15-2022 09:29 AM
- Karma Re: Forwarding ID for Roy_9. 01-15-2022 09:28 AM
- Posted Human or Google web requests on Splunk Search. 01-15-2022 09:23 AM
- Posted Forwarding ID on Splunk Cloud Platform. 11-08-2021 09:30 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
03-25-2024
02:02 AM
Thanks Rich - logical when you think about it. Works a treat - thank you
... View more
03-19-2024
09:30 AM
I have an alert which detects when a log feed has failed The team the alert goes to have asked that I allow them to suppress the alert. I have now created a mailto link within the alert email that sends and email with a specifically crafted email subject and body that is detected in all future alerts to suppress future alerts for 12hrs. a simple math calculation generates the 12hrs, the epoch timestamp is in the subject header, the alert spl looks at the subject and either suppresses the alert or not. This works perfectly - the technical team have now asked that I vary the suppression as follows If the alert came in before 10AM the suppression remains 12 hours If the alert came in after 10AM then the suppression time would be "until 10AM the following day". So - how do you calculate a time stamp to 10AM the following day. It must be simple but my mind has lost it right now. Something like is current hour >10AM timestamp=tomorrow:10Hrs
... View more
Labels
- Labels:
-
email
12-01-2023
02:44 PM
I have a lookup file called TA_feeds.csv with six columns labeled below with multiple rows similar to the one below.
index | sourcetype | source | period | App | Input
Azure | mscs:Azure:VirtualMachines | /subscription/1111-2222-3333-4444/* | 42300 | SPlunk_Cloud | AZ_VM_Feeds
AD | Azure:Signin | main_tenant | 360 | Azure_App | AD_SignIn
I use the SPL
[| inputlookup TA_feeds.csv | eval earliest=0-period."s" | fields index sourcetype source earliest | format]
| stats count by index sourcetype source
which iterates through the the lookup, and searches the relevant indexes for the data one row at a time and generates a count for each input type.
The problem is - if a row in the lookup does not generate any data - then there is not an entry in the stats.
What I need is to be able to show if a feed is zero -i.e. | search count=0 But can't figure out how to generate the zero entries
... View more
- Tags:
- monitoring
Labels
10-23-2023
08:48 AM
Before I start, I've view TreeMap and Word Tree visualisations but they don't seem to do what I need (happy to be proven wrong though) We use workday, we export the complete org hierarchy from workday and ingest that into a lookup table every day. The data contains - Name - OrgPosition- Manager - MiscDetails So Name=Dave Bunn OrgPosition=12345_Dave_Bunn Manager=1230_Mrs_Bunn MiscDetails="some text about my job" We then use the manager detail in the OrgPosition field to look for their manager and so on until we come across as service level manager (indicated in the misc details filed) Name=Mrs Bunn OrgPosition=1230_Mrs_Bunn Manager=10_The_Big_Boss MiscDetails="some text about Mrs Bunns job" Name=Big Boss OrgPosition=10_The_Big_Boss Manager=0_The_Director MiscDetails="Manager of HR" What I would like to do is programmatically generate a hierarchy for any inputted user - with the named individual listed in the middle, their managers above and subordinates below. I would like a visualisation similar to Word Tree Viz, but accept that it's more likely going to have to look like the principal name sandwiched beteen two fileds - one containing sorted managers and one containing sorted subordinates.
... View more
03-20-2023
08:15 AM
Hi I'm not a member of "splunk-usergroups on Slack" so can't see the detail you are referencing
... View more
- Tags:
- error
03-16-2023
09:22 AM
CVE-2023-23397 is all the rage right now. Has anyone figured out a way to detect this in office content? I've checked all Microsoft docs I can find, but nothing informs me as to what I'm actually looking for inside an email or contact etc.
... View more
08-12-2022
12:51 AM
So I seem to of solved my problem, using the following subquery within the radio button, but this seems clunky, is there another way? <input type="radio" token="vpn" searchWhenChanged="true">
<label>Include VPN Logs</label>
<choice value="kwisatz_haderach">Exclude</choice>
<default>kwisatz_haderach</default>
<initialValue>kwisatz_haderach</initialValue>
<fieldForLabel>ASSET</fieldForLabel>
<fieldForValue>ASSET</fieldForValue>
<search>
<query>| makeresults
| eval ASSET="$asset$"
| table ASSET</query>
</search>
</input>
... View more
08-11-2022
02:30 PM
I need the output token of a text box to be the true option of a radio button.
I have two text inputs Username going to $upn$ and Asset going to $asset$ (Both are * as default)
The base search is index=azuread devicename=$asset$ userPincipalName=$upn$
So this work perfectly allowing filter to user and/or asset
But I want to pull in our VPN logs (with an append so that both show in the same table in time order).
The trouble is that our VPN logs only record by asset and are very noisy. so need to be filtered by asset before the append. But when asset is "*" then everything is displayed, obscuring the azure login detail.
I've tried adding a radio button (with the token being $vpn_asset$). I've set the False option as default returning "This_is_not_a_valid_asset_name" which will not match anything in the VPN logs.
I want to set the true option to be $asset$ so that it uses the token from the ASSET text box,
When selecting false - the search "index=VPN deviceName=$vpn$" substitutes $vpn$ with "This_is_not_a_valid_asset_name" which is correct, but when selecting true, the token $vpn$ simply gets substituted for $asset$, whereas I would expect it to be substituted with either the contents to the ASSET Text input.
Any ideas?
The code is something like this (poetic licence is used for simplicity)
input Title="Insert User Principal Name" type=text token=upn default=*
input Title="Insert Asset Name" type=text token=asset default=*
input Title="Include VPN Logs" type=radio token=vpn false="not_an_asset" true="$asset$" default=false
index=azure userPrincipalName="$upn$" userDeviceName="$asset$"
|append [search index=VPN deviceName="$vpn$"]
Whilst "Include VPN Logs" is set to false, the deviceName="not_an_asset" will result in zero VPN logs returned. I need this to pass through the asset detail in the asset input box when set to true, therefore the azure logon details will be interspersed with the VPN logs making assessment easier.
... View more
07-04-2022
04:25 AM
Thanks - simple when you think about it, I was doing a similar thing but allocating a score as I appended each loading, then score<= the results. But this is eloquent - Thanks implemented and working perfectly
... View more
07-02-2022
06:05 AM
SO I have a data set
User Vehicle
User_a Car User_b Car User_a MotorBike User_c MotorBike User_d Car User_c Bicycle User_a Bicycle User_c Scooter User_e Car
What I need is to be able to run a search against this type of dataset and pull out only one return per username based upon those with a CAR, then Motorbike, then bicycle then scooter.
But I only need ONE return for any given user - if they have all four - based upon priority they are reported as a car owner. If they only have two or three of the four, they only get reported as the owner of the highest priority vehicle.
I'm currently doing a search cars, score 1pt, append motobike score 2pt, and so on but that is slow on a big datasaet.
... View more
01-15-2022
09:39 AM
@billathena did you ever resolve this issue, I'm in the same position.
... View more
01-15-2022
09:23 AM
We use Palo Alto, Barracuda, and McAfee WGs. All perform some form of Web Filtering / Blocking, which I'm now being asked to produce a report on, Top 50 blocked categories. The SPL looks something like Index IN (Palo, Barra, MCWG) vendor_action="Blocked-URL" earliest=-8d@d latest=-1d@d | top limit=50 category | stats count by category. The problem is - I need to filter out links to a site (for instance type Betfred into google and I get two blocks although the human never actually went to Betfred. I've also got the dilemma of multiple images being called from a web page each being blocked. So - how do you interpret weblogs to only be unique calls by a human being to a website, rather than google lookups or multiple returns whilst visiting another site. I've tried using dedup against user and URL, but that removes repeat attempts throughout the week along with all the image download requests, it's not very accurate or scientific. There has to be a way to work out that the web request is a link click or a URL entry rather than a page lookup, but I'm at a loss.
... View more
Labels
- Labels:
-
eval
-
field extraction
-
stats
-
table
-
tstats
11-08-2021
09:30 AM
Is there a way to find which forwarder a devices event logs came from. I have hundreds of devices sending WEC logs through WEC servers, I could really do with an easy method to pinpoint where they came from during search time. Something like Index=wec_index | ctable hosts, WECSvr
... View more
Labels
- Labels:
-
using Splunk Cloud