Activity Feed
- Karma Re: Left JOIN using two searches for harsmarvania57. 06-05-2020 12:49 AM
- Karma Re: Convert timestamp from BST to EDT for renjith_nair. 06-05-2020 12:49 AM
- Karma Re: Check values exist within two columns for micahkemp. 06-05-2020 12:49 AM
- Karma Re: Check values exist within two columns for lguinn2. 06-05-2020 12:49 AM
- Karma Re: Check values exist within two columns for micahkemp. 06-05-2020 12:49 AM
- Karma Re: EVAL for multiple conditions check for 493669. 06-05-2020 12:49 AM
- Karma Re: Regex to extract email domain name for elliotproebstel. 06-05-2020 12:49 AM
- Karma Re: Regex to extract email domain name for BearMormont. 06-05-2020 12:49 AM
- Karma Re: Check to compare value with csv contents for cmerriman. 06-05-2020 12:49 AM
- Karma Re: FULL NULL Values based on certain values for DalJeanis. 06-05-2020 12:49 AM
- Karma Re: FULL NULL Values based on certain values for micahkemp. 06-05-2020 12:49 AM
- Karma Re: Count string value over 7 days for mayurr98. 06-05-2020 12:49 AM
- Karma Re: Count string value over 7 days for maciep. 06-05-2020 12:49 AM
- Karma Re: Count string value over 7 days for somesoni2. 06-05-2020 12:49 AM
- Karma Re: Group results by similar name into one for 493669. 06-05-2020 12:49 AM
- Karma Re: Left JOIN using two searches for harsmarvania57. 06-05-2020 12:49 AM
- Karma Re: EVAL statement not correct for mayurr98. 06-05-2020 12:49 AM
- Karma Re: How to add previous week to line chart for comparison? for p_gurav. 06-05-2020 12:49 AM
- Karma Re: Distinct count of machine names for the last 7 days for richgalloway. 06-05-2020 12:49 AM
- Karma Re: addtotals to calculate percentage for mayurr98. 06-05-2020 12:49 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
06-13-2018
02:13 AM
My approach was to subtract 5 hours (18000 seconds) from the timestamp but when using the below line I get no results.
| eval timestamp = timestamp - 18000
Full Query without subtraction
index=duo extracted_eventtype=authentication integration="Microsoft RDP" username=*
| eval Time=strftime(timestamp, "%H:%M")
| eval day=strftime(timestamp, "%Y-%m-%d")
| stats earliest(Time) by day, username
| rename earliest(Time) as LogonTime
| table username, day, LogonTime
| sort username
I included the timestamp in the table to show its format.
... View more
06-08-2018
05:34 AM
Thank you for this but how do I check if the service is enabled ?
The actual issue is that when the user prints multiple pages it only shows 1 page being printed on both WinEvent logs as well as in splunk.
... View more
06-05-2018
04:04 AM
I want to have each individual host listed with a column showing the total time in which the CRITICAL status has been showing.
So the table would look like
| table _time, host, "Folder Name", "Group Name", State , Duration
... View more
06-05-2018
03:39 AM
Thanks but all that was returned was two columns that looks like the below , I added a PIPE to separate the fields.
State | sum(duration)
CRITICAL | 599
State | 598
... View more
06-05-2018
02:08 AM
Is it possible to be able to calculate the total length of time that this host has had a CRITICAL status for if it?
In the screenshot, it has had a CRITICAL status for approx 3 hours 43 minutes indicated.
Below query for one host
index=ad source=dfs host=nas01n
| eval host = lower(host)
| table _time, host, "Folder Name", "Group Name", State
| fillnull value="Folder Not Enabled" "Folder Name"
| fillnull value="No Group Name" "Group Name"
... View more
05-30-2018
05:41 AM
My colleague has setup a Windows Printer App following the below link http://docs.splunk.com/Documentation/Splunk/7.0.3/Data/MonitorWindowsprinterinformation
However, I am not too sure where the print events are being pulled from as after checking the Event Viewer (Windows > PrintService) some logs are empty or do not contain any printing logs so I am at a loss in understanding where they are pulled from. Does anyone know on a more low level detail how Splunk forwards these events?
... View more
05-25-2018
08:05 AM
Thank you but its today that I want not yesterday. We do have splunk 7.0.1 installed. How would timewrap work?
... View more
05-25-2018
07:19 AM
I want to compare the mailbox size from today to last week but my search is very slow and I am not sure how best to make it more efficient
index=msexchange source=exchangemailboxinventory samAccountName=testuser1
| eval mailboxSize = totalItemSize+totalDeletedItemSize
| eval MB = round(mailboxSize/1024)
| eval mailboxGB = round(MB/1024,2)
| eval archiveMailboxSize = archiveTotalItemSize+archiveTotalDeletedItemSize
| eval archiveMB = round(archiveMailboxSize/1024)
| eval archiveMailboxGB = round(archiveMB/1024,2)
| table samAccountName, totalItemSize, totalDeletedItemSize, mailboxGB, archiveTotalItemSize, archiveTotalDeletedItemSize, archiveMailboxGB
| dedup samAccountName
| join type=left samAccountName
[ search index=msexchange source=exchangemailboxinventory samAccountName=testuser1 latest=-1week
| eval mailboxSizeNew = totalItemSize+totalDeletedItemSize
| eval MBnew = round(mailboxSizeNew/1024)
| eval mailboxGBOld = round(MBnew/1024,2)
| table samAccountName, mailboxGBOld
| dedup samAccountName]
| eval mailboxGrowth = (mailboxGB - mailboxGBOld) , growth= (mailboxGrowth/mailboxGBOld)*100
| table samAccountName, totalItemSize, totalDeletedItemSize, mailboxGB,mailboxGBOld, mailboxGrowth, growth
| sort -mailboxGB
... View more
05-25-2018
04:13 AM
I have the below search that shows the total mailboxSize in GB and I would like to compare this with a week ago to determine the size growth as a raw number in GB and the percentage growth/decrease.
index=msexchange source=otl_exchangemailboxinventory samAccountName=*testuser1*
| eval mailboxSize = totalItemSize+totalDeletedItemSize
| eval MB = round(mailboxSize/1024)
| eval mailboxGB = round(MB/1024,2)
| table samAccountName, totalItemSize, totalDeletedItemSize, mailboxGB
| dedup samAccountName
| sort -mailboxGB
... View more
05-15-2018
08:14 AM
This returned 146 results which is the total number of users for this company. However each MailboxId has a count of 1 and no DeviceId is displayed.
MailboxId count DeviceId
Haver_cp 1
dadams_cp 1
For index=msexchange source=otl_mobileiron MailboxId=*_cp Retired="false" the user field is called MailboxId not samAccountName.
And the user field for index=ad source=aduserscan is called samAccountName
( index=msexchange source=otl_mobileiron MailboxId=*_cp Retired="false" )
| stats count values(DeviceId) as DeviceId by MailboxId
When I search the above I get the below data
MailboxId count DeviceId
abon_cp 1 nine54011c5277ab
acavez_cp 1 ninebe03364cd694
acori_cp 1 iqj4udgc1h1q31j8vik9vceflo
akura_cp 1 rbmm3dea9d45v2kbt1rs36a7ok
aruma_cp 2 e53fd31687aa1ae3
ninea8a1b3156df0
... View more
05-15-2018
07:27 AM
Thanks but this only returned 60 results whereas my original search returns 146 results.
I cant upload a screenshot but this search returned all users who have MobileIron (listing several DeviceId's per user) but it did not include those users who don't have it. The source aduserscan contains all users within the companyOu.
... View more
05-15-2018
06:45 AM
Thanks but this is gives the same number of results only a more efficient way to run it.
... View more
05-15-2018
03:40 AM
Search is trying to show all users within the companyOu that have Mobile Iron setup (Status=Allowed) and those that do not (Mobile Iron not setup)
The below search is only showing one user listed but some users have more than one DeviceId configured. I can't work out why all DeviceId's are not showing for a user.
index=ad source=aduserscan
| table samAccountName, companyOu, displayName
| search samAccountName=*_cp companyOu=dacp.com
| rename samAccountName as MailboxId
| join type=left MailboxId
[ search index=msexchange source=otl_mobileiron MailboxId=*_cp
| dedup DeviceId
| search Retired="false" ]
| rename companyOu as Company, MailboxId as "User ID", DeviceFriendlyName as Model, displayName as "Display Name", SyncStatus as Status
| fillnull value="Mobile Iron not setup" Status
| table Company, "User ID", "Display Name", "Status" DeviceId
| sort Company asc
... View more
04-16-2018
10:35 AM
I have created and deployed a new app for DFS Replication called "NAS_DFS" which consists of pulling a csv file from each server
D:\data\splunk\dfs_replication\dfs_replication.csv
This app contains 163 clients in the server class (in the right screenshot) but when searching only 18 hosts are returning (left screenshot).
I'm not sure why only 18 hosts are showing.
inputs.conf
[monitor://D:\data\splunk\dfs_replication\dfs_replication.csv]
index=ad
interval=60
source=otl_dfs
sourcetype=csv
disabled=0
crcSalt=<SOURCE>
app.conf
[install]
state = enabled
... View more
04-10-2018
07:44 AM
How could I convert this GMT time to EDT?
index="wineventlog" host=opdc* Account_Name=*test_user EventCode=4624
| makemv Account_Name
| mvexpand Account_Name
| eval day=strftime(_time, "%d-%m-%y")
| join type=left src_ip
[ search index=ad source=addnsscan earliest=-12h@h latest=now
| rename data as src_ip, name as hostname
| fields src_ip, hostname]
| stats earliest(_time) AS earliest by Account_Name, src_ip, hostname, day
| eval earliest=strftime(earliest,"%d/%m/%Y %H.%M.%S %Z")
... View more
04-05-2018
11:11 AM
Thank you but I have just realized that will affect other other logs that actually have the correct date format.
Would it be possible to have two text inputs "Earliest" and "Latest" which a user can enter the number of days for both to select a period of time. Not sure how to actually implement that.
i.e "Earliest" = 40 days ago AND "Latest" = 20 days ago
... View more
04-05-2018
07:52 AM
Ok perfect thanks. Here is an example raw log.
04/02/2018 09:00:00 +0100, search_name="Support - CSAT Results", search_now=1522662477.000, info_min_time=1522656000.000, info_max_time=1522662477.000, info_search_time=1522662477.324, Assignee=test_user, CSAT Rate=5, Classification="Hardware Issues - PC", Date="2018-03-29 11:48", Key="TEST-457", Reporter=test_user, Summary="Laptop Health Checks", report="jiracsatresults"
... View more
04-05-2018
07:26 AM
Data is forwarded to Splunk every couple of days meaning that the _time stamp relates to the day it was sent to Splunk. The actual date of the event is listed in the logs as e.g Date="2018-03-29 11:48".
How can I make the time picker search the date of the event (Date) rather than the date (_time) the data was ingested by Splunk?
index=summary report=jiracsatresults Key="**" Assignee="**" Classification="**"
| dedup Key
| eval dateEpoch = strptime(Date, "%Y-%m-%d %H:%M")
| eval today = now()
| eval daysAgo = round(((today - dateEpoch)/60/60/24), 0)
| search daysAgo <= 7
| table Key, Summary, Reporter, Assignee, Classification, "CSAT Rate", "CSAT Rating Comment", Date
The only way I get the results for a specific Date e.g for a week is using daysAgo <= 7
... View more
03-26-2018
05:22 AM
Thanks I appreciate your help on this. Now I'm receiving two rows and both are FAIL when running with Last 24 hours
... View more
03-26-2018
04:58 AM
How can I run
| tstats count where index=_internal by _time span=1d
with my first line
| tstats count as "Data Received" where index=msexchange host=opspkhf03p source=skypeuk
They don't run together. Am I explaining myself correctly?
... View more