Activity Feed
- Karma Re: How do I blacklist Logon Type 3 and Account Names in Windows Security logs? for CaptainHook. 10-08-2020 07:24 AM
- Posted Re: How to stop duplicate events 4624 from logging into Splunk on Splunk Enterprise. 09-14-2020 07:58 AM
- Posted Re: How to stop duplicate events 4624 from logging into Splunk on Splunk Enterprise. 09-14-2020 07:51 AM
- Posted How to stop duplicate events 4624 from logging into Splunk on Splunk Enterprise. 09-14-2020 06:20 AM
- Posted Re: How to check "what" changed in a GPO on Splunk Enterprise. 09-02-2020 11:53 AM
- Posted Re: How to check what attributes changed in a Group Policy on Splunk Enterprise. 09-02-2020 11:11 AM
- Posted How to check what attributes changed in a Group Policy on Splunk Enterprise. 08-28-2020 06:40 AM
- Posted Re: How to check "what" changed in a GPO on Splunk Enterprise. 08-24-2020 05:40 AM
- Posted How to check "what" changed in a GPO on Splunk Enterprise. 08-19-2020 06:59 AM
- Posted Re: Query for Checking GPO Changes on Monitoring Splunk. 08-18-2020 06:55 AM
- Tagged Re: Query for Checking GPO Changes on Monitoring Splunk. 08-18-2020 06:55 AM
- Karma Re: Any suitable option for collecting data from HP, Dell switches using Universal Forwarder for dindu. 06-05-2020 12:51 AM
- Karma Re: Can I fill null results of a field with results from another field? for somesoni2. 06-05-2020 12:47 AM
- Karma Re: Is it possible to round up average, max, and min values to 2 decimal places using eval, but without changing how a sparkline is displayed? for Gilberto_Castil. 06-05-2020 12:47 AM
- Karma Re: How to retrieve all apps and reports from the backup after uninstalling and reinstalling Splunk? for musskopf. 06-05-2020 12:47 AM
- Karma Re: Including log events from Microsoft Direct Access for wsmierciak. 06-05-2020 12:47 AM
- Karma Re: How to alert user when the Processor Time exceeds a certain limit for a given certain time for saurabh_tek. 06-05-2020 12:46 AM
- Posted Re: Create an alert based on CPU being at X% for a span of X minutes on Getting Data In. 04-08-2020 06:59 AM
- Posted Create an alert based on CPU being at X% for a span of X minutes on Getting Data In. 03-19-2020 11:44 AM
- Tagged Create an alert based on CPU being at X% for a span of X minutes on Getting Data In. 03-19-2020 11:44 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
09-14-2020
07:58 AM
Hi @gcusello I see. I will search for scripts then and see how that goes. I will update if anything changes. Thank you!
... View more
09-14-2020
07:51 AM
Hi @gcusello Thank you for your response. I'm not looking to dedup the events as that will mean that the events are already indexed. I'm looking for a way to index only 1 event in Splunk instead of several duplicate events coming from the DC's which will help me in saving my license. Thank You!
... View more
09-14-2020
06:20 AM
Hello Everyone, I have searched everywhere for a solution but did not get anything close to what I'm trying to do. So, I have one Domain Controller from where we are capturing data into the DS. On searching for EventCode 4624, I see around 10-15 events with the same timestamp, AccountName, etc. logging in. This single eventcode is consuming around 4-5 GB of license eveyday from a single Domain Controller which is not at all ideal. Blacklisting the event is no help as I need it for several reports. I have already removed the extra description at the end of events to reduce license usage. I was wondering if someone has faced similar issue or if someone could guide me on this, that would be great. Please let me know if I need to provide anymore information.
... View more
Labels
- Labels:
-
troubleshooting
09-02-2020
11:53 AM
@woodcock : Hi! I apologize for tagging you without permission. I have not received any response on this and your answers have helped me a lot in learning about Splunk, so would really appreciate if you could shed some light on my query. Thank you and have a great day!
... View more
09-02-2020
11:11 AM
@nickhills: Hey! Just wanted to know if you have any idea about this one? Thanks!
... View more
08-28-2020
06:40 AM
Hello Everyone,
I have searched for an answer on this forum but have not seen any thread talking about checking the group policy attributes. I'm using Splunk app for windows infrastructure and that gives me the "group Policy changes" report which gives the name of the GPO that was changed and who changed it. However, I need to know how can we check the attributes that are being changed in a GPO as just the GPO name is not helpful. GPO consists of several attributes and searching for the one that's changed will be a tiring process without Splunk. I've seen the following threads about GPO but none of them are about GPO attributes.
https://community.splunk.com/t5/Archive/Query-for-Checking-GPO-Changes/m-p/384810/highlight/false
https://community.splunk.com/t5/Security/How-to-identify-an-admin-who-made-a-change-in-GPO/m-p/469984#M10908
https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-correlate-the-admin-user-with-a-GPO-change/td-p/159210
Please let me know if you have further questions.
Thank You,
Rahul
... View more
Labels
- Labels:
-
troubleshooting
08-24-2020
05:40 AM
Hello Everyone, It would be great if someone could provide any feedback on this request. Thank You!
... View more
08-19-2020
06:59 AM
Hello Everyone, I have searched for this everywhere but have not found any suitable answer. I have Splunk App for Windows Infrastructure installed and I can see the group policy changes in it. However, it only shows the name of the GPO and the user who changed it. I also need to know which GPO attribute was changed by the user. I am not sure how to achieve that using Splunk. I also tried the app "MS Windows AD Objects" but that too doesn't show any relevant information. I have checked the following link for answers: https://community.splunk.com/t5/Archive/Query-for-Checking-GPO-Changes/m-p/384810/highlight/false https://community.splunk.com/t5/Security/How-to-identify-an-admin-who-made-a-change-in-GPO/m-p/469984#M10908 https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-correlate-the-admin-user-with-a-GPO-change/td-p/159210 and all the links within this answer thread. It would be great if someone can please assist me with this as it's very important for the Organization. Thanks, Rahul
... View more
Labels
- Labels:
-
configuration
08-18-2020
06:55 AM
Hi, I understand that this thread is a bit old but I have searched for an answer everywhere and haven't found any. So, I was wondering if someone could actually help with this as I have a similar query. I am able to get which group policy changed and by whom, but I also need to know what exactly changed in a GPO. Can someone please tell me how can we do that? I am using Splunk app for Windows Infrastructure and it's set up correctly. Thanks,
... View more
04-08-2020
06:59 AM
Hi @to4kawa ,
Thank you for your response. I am using both, however, am not sure what exactly to check in job inspector that will give me the idea that the SPL is correct.
Regarding logs, am trying to find a way to submit them. I will try and add a link to it.
Thank you!
... View more
03-19-2020
11:44 AM
Hi Everyone!
I have researched this issue and found a few solutions, though not completely. I followed this link:
https://answers.splunk.com/answers/557838/create-an-alert-based-on-cpu-being-at-95-for-a-spa.html
and wanted to know if I can use "%_Processor_Time" instead of CPUPct as I am not able to extract "CPUPct" field.
Also, I followed this link: https://answers.splunk.com/answers/693250/how-do-i-alert-if-cpu-is-greater-than-97-for-more.html
here, I wanted to understand what does "instance=Total" mean?
Also, which one of the accepted answers is better to use? The queries I used are as follows:
SPL 1:
index="perfmoncpu" | bin _time span=1m
| stats max(%_Processor_Time) as PercentProcessorTime by host _time
| eval PercentProcessorTime = round(PercentProcessorTime, 2)
| eval overload = if(PercentProcessorTime >= 90, 1, 0)
|streamstats current=f last(overload) as prevload by host
|eval newgroup=case(isnull(prevload),1, prevload!=overload,1, true(),0)
|streamstats sum(newgroup) as groupno by host
|eventstats count as LoadDuration by host groupno
| where overload = 1 and LoadDuration >= 10
| table host _time PercentProcessorTime LoadDuration
SPL 2:
index="perfmoncpu" source="PerfmonMk:CPU" instance=_Total
| sort 0 _time
| streamstats time_window=15min avg(cpu_load_percent) as last15min_load count by host
| eval last15min_load = if (count < 90,null,round(last15min_load, 2))
| where (last15min_load) >= 90
| table host, cpu_load_percent, last15min_load
I have used count<90 as the above SPL generates a count of 90 mins throughout
Please let me know if you guys have any further questions.
Thank You!
PS: I am a newbie trying to learn splunk!
... View more
02-27-2020
08:42 AM
I would like to know if iplocation.py file has been deprecated with the newer version since I was looking at this link
https://answers.splunk.com/answers/37249/specifying-field-w-iplocation.html
and thought it would be helpful to look at the code and make some changes as per requirement. However, I am not able to find the file.
... View more
02-27-2020
08:31 AM
Thank you @sumanssah !
That helped. Will try and add the IP's and check if that works. Thank you!
... View more
02-27-2020
08:21 AM
Update: I was on version 8.0.1 and upgraded it to 8.0.2, however, still can't find iplocation.py file.
... View more
02-27-2020
07:26 AM
Hello Eveyone,
I am trying to use iplocation command to search for ip address info within my network. My search is as below:
eventtype=wineventlog_security
| iplocation src_ip prefix=srcip_
| table src_ip, City, Country
I am getting the IP list with other columns blank. I did some research and found iplocation.py is not present in the above directory. I do have GeoLite2-City.mmdb and iso3166 files in "$SPLUNK_HOME/share/" directory. I am wondering if the missing .py file is the reason for my issue. If so, how can I resolve it?
Any help would be much appreciated. Thank You!
... View more
02-19-2020
10:47 AM
Hi @DalJeanis !
I has similar issue where I want to trigger an alert if CPU usage is 100% for more than 10min. I am using % processor TIme instaed of CPUpct. Wanted to knw if that will provide the same result. Here is my modified SPL:
index="perfmoncpu" source="PerfmonMk:CPU" | bin _time span=1m
| stats avg(%_Processor_Time) as PercentProcessorTime by host _time
|eval PercentProcessorTime = round(PercentProcessorTime, 2)
|eval overload = if(PercentProcessorTime >= 100, 1, 0)
|streamstats current=f last(overload) as prevload by host
|eval newgroup=case(isnull(prevload),1, prevload!=overload,1, true(),0)
|streamstats sum(newgroup) as groupno by host
|eventstats count as groupsize by host groupno
|where overload=1 AND groupsize >= 10
|table overload, host, PercentProcessorTime
Thank you for your help!
... View more
02-19-2020
09:52 AM
Hi @saurabh_tek
I am trying to find a solution to the same problem as mentioned by you. I hope you were able to resolve it. If so, could you please let me know how to handle this? There are several threads with similar questions but none of it actually worked.
Thanks!
... View more
02-13-2020
05:40 AM
Hello Splunkers!
Could someone please guide me on this?
... View more
02-12-2020
01:28 PM
Hello Everyone,
I have a service account that I need to configure to collect WMI data from domain controllers. This account can't be an admin on the domain controller, so am trying to provide least privilege access to my account as per the documentation below:
https://docs.splunk.com/Documentation/Splunk/8.0.1/Data/MonitorWMIdata
I am running splunk enterprise 8.0.1 and have a basic architecture with only one instance of splunk running as an indexer and search head. I have not installed any forwarder(not allowed to install that on DC as per policy).
So far, I have tried everything in this link:
https://answers.splunk.com/answers/2703/how-to-enable-wmi-data-collection-on-a-domain-server.html
However, I am still not able to connect to the DC. The above link says that it's been tried on windows 2003. I have windows server 2012 and 2016. Could someone please assist me in getting this fixed? Any help would be greatly appreciated. Please let me know if you require further information. I apologize if I have missed anything crucial. I am still a newbie trying to find my way through it.
Thank You!
... View more
01-28-2020
12:56 PM
Thank you so much @nickhillscpl ! Will try and see what can be done. Thank You so much!
... View more
01-28-2020
12:47 PM
Oh okay. Thanks! So, when I go to set up remote event logs and enter the domain ip address as host, I get the error "Unable to get wmi classes from host. The host might be unreachable or misconfigured." My host machine is a part of the DC and I am an admin user on my server. Do I need to do any other settings to resolve this?
... View more
01-28-2020
12:37 PM
in that case, is there any other port on which I can configure splunk to listen without having to install it on the domain controller? e.g. if there's any other open port on my host, and if I configure that port to listen to tcp, will that do any good?
... View more
01-28-2020
12:23 PM
Hello Everyone!
So, I have my Splunk Enterprise and universal forwarder installed on the same machine running Windows Server 2019.
I wanted to know if there was a suitable way of collecting logs from switches using UF and bringing it to the indexer?
... View more
01-28-2020
12:19 PM
Hi @nickhillscpl ! Is it possible that some firewall enabled at domain controller can prevent the data from coming to splunk using UF? Will it be possible to set up firewall rule to enable tcp port 9997 to listen to traffic data, and then can it deliver data to the indexer?
... View more
01-28-2020
12:16 PM
Hi @nickhillscpl ! Is it possible for the data from DC to not come in if there is firewall rule enabled stopping any listening on port 9997? Just wanted to know if I can add some firewalls rule at domain controllers to allow listening at tcp port 9997. Do you think that might help?
... View more