Activity Feed
- Got Karma for how can i list all indexes and sourcetypes?!. 10-29-2020 08:03 AM
- Karma Re: where username NOT equal to list of usernames in Lookup table for Ayn. 06-05-2020 12:46 AM
- Karma Re: license master DR/ HA/ Redundancy - use DNS name for Damien_Dallimor. 06-05-2020 12:46 AM
- Karma Re: Can you index evtx on linux heavy forwarder? 4.3 for Kate_Lawrence-G. 06-05-2020 12:46 AM
- Got Karma for No option to Export CSV results from dashboard UI app view????????. 06-05-2020 12:46 AM
- Got Karma for combine stats count and stats first. 06-05-2020 12:46 AM
- Got Karma for combine stats count and stats first. 06-05-2020 12:46 AM
- Got Karma for Can you index evtx on linux heavy forwarder? 4.3. 06-05-2020 12:46 AM
- Got Karma for deleted data - | delete - a query to prove this command has not been used and no data has been deleted?. 06-05-2020 12:46 AM
- Got Karma for search to find gaps in data?. 06-05-2020 12:46 AM
- Got Karma for how can i list all indexes and sourcetypes?!. 06-05-2020 12:46 AM
- Got Karma for how can i list all indexes and sourcetypes?!. 06-05-2020 12:46 AM
- Got Karma for where username NOT equal to list of usernames in Lookup table. 06-05-2020 12:46 AM
- Got Karma for No option to Export CSV results from dashboard UI app view????????. 06-05-2020 12:46 AM
- Got Karma for No option to Export CSV results from dashboard UI app view????????. 06-05-2020 12:46 AM
- Got Karma for inputlookup format to insert wildcard * is it possible?. 06-05-2020 12:46 AM
- Got Karma for How to send same data to multiple separate splunk instances- UF. 06-05-2020 12:46 AM
- Got Karma for How to send same data to multiple separate splunk instances- UF. 06-05-2020 12:46 AM
- Got Karma for How to send same data to multiple separate splunk instances- UF. 06-05-2020 12:46 AM
- Got Karma for license master DR/ HA/ Redundancy - use DNS name. 06-05-2020 12:46 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
2 | |||
3 | |||
1 | |||
1 | |||
1 | |||
3 | |||
0 | |||
0 | |||
0 | |||
3 |
02-04-2014
07:32 AM
2 Karma
How do i combine these stats commands?
1)
| stats count by user host
creates table:
user host count
2)
| stats first(_time) AS latest by user host
creates table:
user host latest
How do i combine to create a table
user host latest count
... View more
08-14-2013
04:07 AM
How does it work if not the defaultGroup, and we are using _TCP_ROUTING as in my example?
i.e some data in default group is being sent instance A.
we use tcp routing to send data to other locations.
should this work?
[monitor:///app/logs/work/*]
_TCP_ROUTING=Location1;Location2
index = test1
sourcetype = work
... View more
08-13-2013
03:29 PM
3 Karma
I have a splunk UF on a Linux server. (4.3.6)
I want to send the local log files to 2 separate splunk instances, so both get a copy of the exact same data. (not autoLB across 2, not send different data to each one)
how can I do this from a UF?
Outputs.conf has two groups defined called Location1 and Location2
like this
1)specify multiple groups:
[monitor:///app/logs/work/*]
_TCP_ROUTING=Location1;Location2
index = test1
sourcetype = work
2) repeat same monitor stanza:
[monitor:///app/logs/work/*]
_TCP_ROUTING=Location1
index = test1
sourcetype = work
[monitor:///app/logs/work/*]
_TCP_ROUTING=Location2
index = test1
sourcetype = work
3) I though of using indexAndForward but I don’t want any transforms/props to take place from say Location1 before it sends to Location2, and I don’t really want Location 1 to be a dependency for Location2.
Advice please
... View more
02-20-2013
05:00 AM
1 Karma
inputlookup like:
user mailbox
smithj john smith
bloggsj joe bloggs
search string:
| inputlookup usermailbox.csv | fields search user mailbox | format "(" "(" "AND" ")" "OR" ")"]
returns
( ( user="smithj" AND mailbox="john smith" ) OR ( user="bloggsj" AND mailbox="joe bloggs") OR...
what i want is to return
( ( user="*smithj*" AND mailbox="*john smith*" ) OR ( user="*bloggsj*" AND mailbox="*joe bloggs*") OR...
Current workaround is to put the wildcards * in the csv values like so but this is a pain
user mailbox
*smithj* *john smith*
*bloggsj* *joe bloggs*
... View more
01-18-2013
09:24 AM
1 Karma
How can i tell if any data has been deleted using the | delete command?
how can i prove no data has been deleted?
Can i see if there are any flags against the data on the idnexers?
Does this command hide the data at Search Head leel or at the Indexer?
Edit: To clarify - i understand this command does not actually delete the data. i want to know if any admin user has given themself the can_delete privelege and deleted(hidden) data using |delete.
... View more
12-19-2012
06:40 AM
1 Karma
I have had some data reporting in from event logs from approx 30-40 windows servers.
There were some issues on some of the hosts over the past 3 months, which has led to some gaps in the data. (inputs.conf had "current_only = 1")
I intend to try and back fill those gaps via evt/evtx files but initially i would at least just like to know where and what data ranges there are prolonged gaps, say of more than 15 minutes from each host.
so to produce resuls like
host from to
server1 19/10/2012 13:45:27 29/10/2012 09:45:27
server1 11/11/2012 17:25:32 12/11/2012 08:35:29
server2 31/10/2012 11:25:32 02/11/2012 18:22:22
etc....
... View more
12-19-2012
03:36 AM
3 Karma
i can do
| metadata type=sourcetypes |table sourcetype
but what i would like is the equivalent of:
| metadata type=sourcetypes index=* | table index sourcetype
however this does not work and does not enter data in the index column
How can i achieve this very simple list, preferably without using stats command
... View more
12-06-2012
05:49 AM
is there anyyway to define at what point in time windows event logs will start being collected by Splunk UF?
We have [WinEventLog:Application]
current_only = 1
index= winapp
The server had an issue and splunk UF was stopped for several hours.
How can i get collect those events that were missed when splunk is re started? 'current_only' says "index from the point splunk is started"if i remove the "current_only" splunk will start indexing the entire multi year history of the event log. It has only been enabled for a few months and we do not want the old data. any ideas?
If i export a .evt file containing only these events and index that, will the splunk see the data in the same format? will all my field extractions etc work? or will it be completely different format? i will still have to modify all saves searches and dashboards to ensure it will include the data which is a pain
... View more
09-12-2012
07:12 AM
This seems strange, I have 2 searches which produce a simple table of results. i have added the following to the end of the saved search.
| outputcsv "metrics/metrics_data1_feed"
| outputcsv "metrics/metrics_data2_feed"
However, one of the reports does not add the file extension ".csv"
Files create:
/apps/splunk/var/run/splunk/metrics/metrics_data1_feed
/apps/splunk/var/run/splunk/metrics/metrics_data2_feed.csv
What is going on?
Do I just need to change command to
| outputcsv "metrics/metrics_data1_feed.csv"
| outputcsv "metrics/metrics_data2_feed.csv"
... View more
- Tags:
- outputcsv
09-06-2012
11:28 AM
i have search which produces results as follows
UserID Action
domain\aas1234 blah blah
domain\aas1235 blah blah
I have csv file like so
ID FirstName SecondName
aas1234 Joe Bloggs
aas1235 Dave Smith
I want to add the fristName and SecondName to the results by looking up based on the the Searcgh results. i can see documebntation how to do this in props&trandsforms.conf but how do i do this at search time in the search bar?
im aiming for the follwing result:
UserID Action FirstName SecondName
domain\aas1234 blah blah Joe Bloggs
domain\aas1235 blah blah
... View more
09-05-2012
08:59 AM
3 Karma
I have created a simple UI dashboard app, which has a simple form based search and is locked down so the user cannot drill down to results and therefore get open access to the search bar.
However i would like them to be able to export the table of results to a CSV.
Unfortunately the Actions menu only has Print and a greyed out PDF option as the PDF server is not configured. some answers post seem to suggest this is not pssible? can someone confirm?
I am using Advanced XML, cann i not add in a exportCSV module somehow?
Thanks
... View more
09-01-2012
11:20 AM
Sorry i am a noob to regex and splunk regex especially.
Regex to extarct all that is between the two single quotes. there will never be a single quote in the name.
EG extract the name
Bloggs, Joe:IT
two Message field examples:
The user 'Bloggs, Joe:IT' logged in
Mailbox of 'Smith, John:HR' was opened
How can i:
A) do this using REX
B) do this in props.conf
REX something like
index =data | rex field=Message "\'(?P<name>)\'"
and from a REx how do you change it to extarct in props.conf?
Thanks in advance
... View more
- Tags:
- field-extraction
- rex
09-01-2012
11:07 AM
This doesnt return anything when i know there are many events with the usernames in the message!
this returns a list of the usernames correctly
|inputlookup list.csv | fields UserLogonName
i have an extracted field called Messsage that will have the username SOMEWHERE in the message
index = blah Message=”|inputlookup list.csv | fields UserLogonName”
Thsi doesnt work, no results retrned!
PLease help!
thanks!
... View more
07-12-2012
01:04 AM
No this didnt work either. there must be some config to tell it to cook the data? the queue = winparsing didint work.
... View more
07-11-2012
02:02 PM
thanks. i have tried with full splunk. still the same. do i need to configure anything special in inputs, props or transforms.conf to make sure it cooks the data first... i only have inputs.conf.
do i need to do something different in inputs.conf?
[monitor://$SPLUNK_HOME\evtmon
recursive = false
sourcetype = sevtx
index = indevtx
i tried [WinEventLog://$SPLUNK_HOME\evtmon but nothing gets forwarded
... View more
07-11-2012
09:31 AM
i just tried on a windows universal forwader, forwading to a linux indexer.
the forwarder has read the file and sent to indexer but it has indexed in its binary format:
4:53:58.000 AM
\x00\x1\x00\x4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00+\x2!\x00\x4\x000\x00t'0@\x00\x00\x00\x00......... etc!
Does the indexer have to be windows too!!!?
... View more
07-10-2012
09:05 AM
1 Karma
Does not make it clear here:
http://splunk-base.splunk.com/answers/141/can-splunk-index-windows-event-logevtevtx-files
Does this absolutely have to be a windows forwarder?
... View more
07-04-2012
06:08 AM
Hexx, Pease can you confirm this is fixed in 4.3? i have a scheduled saved search which emails results with CSV of results as its alert action. it seems to be truncating at 10000 rows.
This one comment by you is the only mention that this has been changed in 4.3, however i am running 4.3.1 and am still having the issue!
Could this be the reason?
limits.conf
[scheduler]
max_action_results =
* The maximum number of results to load when triggering >an alert action.
* Defaults to 10000
?
... View more
06-28-2012
06:13 AM
just add this line?
<param name="value"></param>
didnt work for me no change
... View more
06-28-2012
06:11 AM
what have you changed? only added
?
... View more
06-28-2012
04:48 AM
(NOTE - I have read other similar posts and solutions have not helped)
I have a created a dashboard with 2 text boxes for a search. The default value if nothing enetered is "*".
This worked well until i needed to add a radio button to the search options and i was forced to convert to advanced XML.
Now i have converted all works well if i leacve text boxes empty and the search uses the *, but if anything entered into text boxes i get the error below:
PARSER: Applying intentions failed 'unicode' object has no attribute 'get'
http://splunk-base.splunk.com/answers/3606/unicode-object-has-no-attribute-get#3665).:
This one states to add the line
<param name="value"></param>
This does not fix issue. It also says to change the order round- this does nto seem to work either! my code:
<module name="ExtendedFieldSearch">
<param name="replacementMap">
<param name="arg">
<param name="Group"/>
</param>
</param>
<param name="field">Enter ’Group' name</param>
<param name="intention">
<param name="name">stringreplace</param>
<param name="arg">
<param name="Group">
<param name="default">*</param>
<param name="fillOnEmpty">True</param>
</param>
</param>
</param>
<module name="ExtendedFieldSearch">
<param name="replacementMap">
<param name="arg">
<param name="UserAddedRemoved"/>
</param>
</param>
<param name="field">Enter 'Username'</param>
<param name="intention">
<param name="name">stringreplace</param>
<param name="arg">
<param name="UserAddedRemoved">
<param name="default">*</param>
<param name="fillOnEmpty">True</param>
</param>
</param>
</param>
let me know if you need more?
Please do not just point me to another post as none of them clearly identify what needs changing
... View more
12-22-2011
03:56 AM
We have a few diffent splunk splunk installations which i would like all to use a central License master.
However if a different team mananges the other splunk installation and i have setup a pool and licence allocation for them - how can they see and monitor their usage?
I dont want to permission them to the License Manager Search head.
As i understand no license usage is logged to the slaves?
Do i have to create a report to send out license usage details to respective team?
Or is there a way to get this data to the slave installation?
... View more
- Tags:
- license
- monitoring
12-22-2011
03:51 AM
can i define what indexers and search heads can connect to a license master up front before they have tried to connect?
i.e do i have to create a pool that states ANY INDEXER can connect? wait for them to connect and then change it to Specific indexers only?
What will happen if none of the pools allow "ANY INDEXER" and they point a live indexer to the license master when it has no pool allocated?
thanks
... View more
12-09-2011
01:48 AM
if you change the DNS master could you get certificate issues? btween the slaves and new master
... View more
12-06-2011
05:28 AM
if you have a stack with say 200gb and you allocate
PoolA - 80GB
PoolB - 80GB
If PoolB went over the limit by 20GB would it automatically juts use the extra GB available and not cause a Real license violation?
OR if you allocated all of the stack:
PoolA - 100GB
PoolB - 100GB
and Pool A only used 50GB and PoolB wused 120GB Would this also cause a violation or would it understanmd that in total you hadnt caused a violation..
I.e. are violations at a Stack level or Pool level?
Obviously the goal here is to allocate pools some license but leave some shared head room to avoid lic violations....
Thanks
... View more