Activity Feed
- Got Karma for Re: Calculating distances between points with GEOIP using latitude and longitude, can I use Trigonometric functions directly in a search in Splunk 6.1.5. 03-14-2023 12:31 PM
- Got Karma for Re: Should we run Splunk as root or non-root user?. 01-30-2021 08:30 AM
- Karma Microsoft Office 365 Reporting Add-on for Splunk is Unstable- Anyone else experiencing this issue? for lucas4394. 06-05-2020 12:50 AM
- Karma Re: Smart-mode search emits only one row of stats but gets auto-finalized for disk usage for martin_mueller. 06-05-2020 12:50 AM
- Karma Re: Can you help me with my Search Head Cluster Setup Error?: "Cannot start a Captain" for p_gurav. 06-05-2020 12:50 AM
- Karma Can you help me with my Search Head Cluster Setup Error?: "Cannot start a Captain" for joesrepsolc. 06-05-2020 12:50 AM
- Karma Chart with Trendline in splunk for karthi25. 06-05-2020 12:49 AM
- Karma Re: Is there a way set CPU and Memory consumption for splunkd process to a particular limit? for lguinn2. 06-05-2020 12:49 AM
- Karma "Bad regex" warning after upgrading from Enterprise 6.5.1 to 7.0.1. for kentcoble. 06-05-2020 12:49 AM
- Karma Re: License and usage reporting in 6.5? for ChrisG. 06-05-2020 12:48 AM
- Karma Why am I unable to export results from a long-running search query? for _smp_. 06-05-2020 12:48 AM
- Karma More DB Connect timestamp parsing trouble for wegscd. 06-05-2020 12:48 AM
- Karma Re: Different configs for Splunk_TA_windows depending on serverclass for dshpritz. 06-05-2020 12:48 AM
- Karma How often indexes or sourcetypes are being searched? for jguzowski. 06-05-2020 12:48 AM
- Karma How to get AD FS 2.0 WinEventLogs into Splunk? for jdaves. 06-05-2020 12:47 AM
- Karma Re: How to get AD FS 2.0 WinEventLogs into Splunk? for jdaves. 06-05-2020 12:47 AM
- Karma How can I determine how much an index is being searched? for jamesvz84. 06-05-2020 12:47 AM
- Karma What capabilities does a REST API only user need? for ckurtz. 06-05-2020 12:47 AM
- Karma Re: Use subsearch result as fulltext search in outer search for marcoscala. 06-05-2020 12:47 AM
- Karma Re: Splunk Add-on for Java Management Extensions: Why is the host field not being extracted? for jcoates_splunk. 06-05-2020 12:47 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
1 | |||
0 | |||
1 | |||
1 | |||
1 |
06-28-2019
01:37 PM
1 Karma
Here's a handy macro I just created base on this answer. I used the multiplier for miles instead of km. Define as haversine(4), takes args lat1,lon1,lat2,lon2 and creates a "miles" field.
eval rlat1 = pi()*$lat1$/180, rlat2=pi()*$lat2$/180, rlat = pi()*($lat2$-$lat1$)/180, rlon = pi()*($lon2$-$lon1$)/180
| eval a = sin(rlat/2) * sin(rlat/2) + cos(rlat1) * cos(rlat2) * sin(rlon/2) * sin(rlon/2)
| eval c = 2 * atan2(sqrt(a), sqrt(1-a))
| eval miles = 3963 * c
Here it is included in the use case that brought me here.
sourcetype=oktaim2:log
| streamstats global=f window=2 current=t earliest(client.geographicalContext.geolocation.lon) AS lon1 latest(client.geographicalContext.geolocation.lon) AS lon2 earliest(client.geographicalContext.geolocation.lat) AS lat1 latest(client.geographicalContext.geolocation.lat) AS lat2 earliest(client.geographicalContext.city) AS src_city latest(client.geographicalContext.city) AS dest_city earliest(client.geographicalContext.state) AS src_state latest(client.geographicalContext.state) AS dest_state earliest(_time) AS departed_time latest(_time) AS arrived_time BY user
| where lat1!=lat2 AND lon1!=lon2
| `haversine(lat1,lon1,lat2,lon2)`
| eval hours=(arrived_time-departed_time)/60/60
| eval avg_mph=miles/hours
| where avg_mph>500 AND miles>100
| eval src_locale=src_city . ", " . src_state, dest_locale=dest_city . ", " . dest_state
| table _time lat1 lon1 lat2 lon2 src_locale dest_locale miles hours avg_mph user
| sort _time desc
... View more
02-21-2019
12:20 PM
I have a user whose monthly report search is being auto-finalized due to disk usage. I've ensured there are no other jobs hanging around, and it's being run in Smart mode. Here's what the search looks like (base search modified for public posting):
index=redacted
| stats latest(time_taken) AS time_taken latest(responseTime) AS responseTime by CorrelationId
| eval responseTime=(time_taken * 1000)
| stats count, avg(responseTime) as AvgTime, p99(responseTime) as p99, p95(responseTime) as p95, p90(responseTime) as p90, p50(responseTime) as p50
This is over tens of millions of events, but it produces only one row of output, as expected. My only theory so far is that the first stats output gets saved to dispatch along with the final output, but that seems... wrong.
... View more
05-14-2018
07:06 AM
We ran into this as well. It looks like Splunk 7 has stricter interpretation of the character class construct, so [\S-\S] means "non-whitespace to non-whitespace" instead of "non-whitespace dash non-whitespace." Ultimately this makes the behavior more predictable.
... View more
01-08-2017
05:52 AM
This worked for me after changing the beginning of the rex to "\w+\s+" , using this against dnmasq-dhcp syslog from Tomato firmware.
... View more
08-18-2016
08:03 AM
The Slack user owning the webhook may need elevated privileges in Slack (not Splunk.) Setting the account to 'admin' in Slack seems to work, but I would look into whether some kind of lesser permissions will also work.
... View more
05-06-2016
09:38 AM
Thanks for answering! This is my fallback approach, but I would prefer to deploy a pristine Splunk_TA_windows and a seperate app as needed for each distinct configuration of it.
... View more
05-06-2016
08:31 AM
I need to deploy different configs to sets of deployed Splunk_TA_windows apps. I haven't had any luck trying to use the method that works with the *NIX TA of making an app with just the inputs enabled and modified. Can this work, or do people just copy the entire TA and modify it?
Example:
Deploy TA to biz unit A so that WinEventLog:Security is enabled and data goes to index bizA
Deploy TA to biz unit B so that WinEventLog:Security is enabled, all windows filtering platform events are blacklisted, and data goes to index bizB
The important part is not how to specifically do these stanzas, but how to get them picked up by the appropriate clients, preferably without cloning Splunk_TA_windows.
... View more
04-19-2016
07:22 AM
Thanks. FWIW, this was ultimately rendered moot by running the TA on each UF, connecting to localhost go get the data.
... View more
02-08-2016
07:57 AM
If you have your sourcetype as access_combined_wcookie or access_common, Splunk automatically extracts that URI segment as a field called "root".
... View more
Ran across this issue with a saved search that was shared in the app and a macro that was private. Making the macro shared in the app fixed the issue of not being able to save the modified search with the macro in it. Check the permissions of the knowledge objects used in your search.
... View more
08-20-2015
07:33 AM
Having the same issue with the same app, but it appears that the modular input fails to run if there is any file (even a dotfile) in the boot directory. So...
1) Why do deployment server / deployment client fail to deliver an empty directory?
2) Why does SPLUNK4JMX fail to work with a seemingly innocuous file in bin/lib/boot/ ?
... View more
06-30-2015
12:45 PM
The TA for JMX doesn't seem to be extracting the host field, so all my events appear to come from the heavy forwarder running the add-on. The stanza in transforms is attempting to match on a string starting with host= but I don't see that in any of the data being collected. Here's the stanza included with the app:
[extract-host]
DEST_KEY = MetaData:Host
REGEX = host=([a-zA-Z0-9\._-]+)
FORMAT = host::$1
... View more
> Splunk recommends that you don't run as root.
I'm looking for a citation in the online docs, but not finding any specific recommendation. A recommendation from Splunk would be helpful in forming or justifying our own policy. All I have found so far is Run Splunk Enterprise as a different or non-root user
... View more
10-08-2013
09:56 AM
A little searching led me to look at literals.conf, but I don't see that config item.
... View more
10-06-2013
12:56 PM
Again, you have 8 vCPUs allocated. How many sockets and cores are available to satisfy that?
Have you tried lowering the number of vCPUs and measuring response times?
... View more
10-06-2013
11:35 AM
If this is close to the man page for your syslogd, it may not have support for logging to an alternate port: http://linux.die.net/man/8/syslogd
I can recommend rsyslog as a very flexible alternative.
... View more
10-06-2013
05:36 AM
Are you running the S.o.S. app? http://apps.splunk.com/app/748
Is RHEL setup according to VMware timekeeping guidelines? See their caveat about use of the divider=10 kernel param: http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1006427
Does the jobs inspector show any long-running searches? I see in your 'top' output you have a splunkd with 1358M of memory and a lot of cpu time under its belt.
... View more
10-06-2013
05:26 AM
3 Karma
You could try fillnull: http://docs.splunk.com/Documentation/Splunk/6.0/SearchReference/Fillnull
| fillnull value=0
This will fill any existing field that is null with the value "0"
| fillnull value=0 total
This will fill only the field named "total" with "0"
... View more
10-05-2013
11:07 PM
Are you relatively low on disk space? See the first item here:
We have increased the default amount of required available disk space for indexing and searching
Prior to version 6.0, the default amount of free space Splunk needed to index and search was 2 gigabytes. When you upgrade, Splunk raises this default requirement to 5 gigabytes. Before you upgrade, make sure you have enough free space on the volume(s) that contain Splunk indexes and search dispatch directories to ensure uninterrupted index and search operation
... View more
10-05-2013
10:59 PM
1 Karma
There is a new search command, pivot, for using data model: http://docs.splunk.com/Documentation/Splunk/6.0/SearchReference/Pivot
Or to use data model data with the usual reporting commands, you can use: http://docs.splunk.com/Documentation/Splunk/6.0/SearchReference/Datamodel
... View more
10-05-2013
10:53 PM
Is your VMware infrastructure up to par? How many real sockets and cores do you have available? Are your VMware tools installed, up to date, and running? Are there any interesting events or alerts on the VMware side?
... View more
10-05-2013
10:45 PM
My guess would be that anything that creates a sane .csv is fine, including vi. I'm not in a position to test that, so not posting this as an actual answer. 🙂
... View more
10-05-2013
10:37 PM
2 Karma
From http://docs.splunk.com/Documentation/UnixApp/latest/User/First-timeconfiguration#Settings:_Categories
When making host assignments, note the
following:
You can only assign hosts to a group. When you do this, the Splunk
App for Unix and Linux automatically
assigns the hosts to the category that
contains the group.
You can assign hosts to more than one group at a time. However, each
group must be a member of a separate
category.
Maybe you've added hosts to multiple categories?
... View more
10-05-2013
10:32 PM
Looking at the monitor stanza versus regex, I would also do this:
[monitor://e:\syslog\ASA\ASA_Syslog_*]
...
whitelist = (|2009|20[1-9][0-9])-(0[1-9]|1[012])-([123]0|[012][1-9]|31).
... View more
10-05-2013
10:24 PM
1 Karma
I'm trying to walk through the tutorial at http://dev.splunk.com/view/SP-CAAAEN2 using Splunk free. This is a 5.x install that reverted to free after the trial period and was just upgraded to 6.0, using only the integrated framework app (never installed beta or preview.)
When I create an app, restart, and try to access it before adding any content, I get into what looks like a redirect loop and sit at /en-US/account/login/?return_to=%2Fdj%2Fen-us%2Fmydashboard%2Fhome%2F forever.
... View more