Quantcast
Channel: Questions in topic: "splunk-enterprise"
Viewing all 47296 articles
Browse latest View live

Anyone have a good search to determine if an app has stopped across 4k machines?

$
0
0
All, I have the PS input from Splunk for Unix enabled on all endpoints. Seems to be there should be an easy way to check running status of a process from 15 minutes ago to now and get a list of machines where the app has stopped. thanks -Daniel

Splunk forwarder question

$
0
0
Hi there, We have Splunk forwarder deployed on a Windows server and inputs.conf is configured with two log sources. [default] host = test_OP_CBE_AUX1 [monitor://C:\ClearPath\logs] whitelist = [\\]cpe2Pims-\d\d\d\d_\d\d_\d\d\.log$ index = pb sourcetype = json recursive = false disabled = false [monitor://C:\ClearPath\logs\CatalogUpdater] whitelist = [\\]UnclassifiedExtractor_splunk\.log index = pb sourcetype = json recursive = false disabled = false However, we are seeing logs forwarded to Splunk indexer only from [monitor://C:\ClearPath\logs] and other source [monitor://C:\ClearPath\logs\CatalogUpdater] does not forward the logs. If set disable to "true" for [monitor://C:\ClearPath\logs] -- we immediately see logs being forwarded from [monitor://C:\ClearPath\logs\CatalogUpdater] This is not a licensing issue. Any inputs on what's causing this issue will be greatly appreciated. Cheers, Pam

In splunk to find percentage difference for each column

$
0
0
I need to find the difference between each date for each App_name in splunk Right now my query just show the today number of record recieve each day per topic name/ Appname. I want to find out the percentage difference of record for each day from its previous day. index="platform" sourcetype="logs" | rex "sent:\s(?\d+)\sfrom the file\s:\s(?[\w\.\/\_\-]+)\s" | rex field=source "\.(?[\w\/\_\-]+)\." | timechart span=24h sum(record) as records by topic_name Can someone help

[BUG] Submit button does not seem to work as expected for inputs in Splunk 6.6 +

$
0
0
Expected behavior for Submit button in Simple XML Dashboard is to `prevent Input changes to be reflected until Submit button is clicked`, provided `searchWhenChanged` for the input/s is/are set to `false` and they do not have their `` event handlers defined. However, when I tested small piece of run anywhere example in `6.6.3` and `7.1.2`, Submit button does not seem to enforce the right effect. Whenever input was changed the tokens got the updated values even before clicking on the Submit button. (PS: I also tested for `radio` input but have not added the code for keeping the example simple).
OneTwo1-24h@hnow
form.tokPanel- $form.tokPanel$
form.tokTime- $form.tokTime.earliest$,$form.tokTime.latest$
tokPanel- $tokPanel$
tokTime- $tokTime.earliest$,$tokTime.latest$
Requesting Splunk Team to confirm if the `Submit` button is truly obsolete or not. If so, it would be better to remove Submit button as Input option. (PS: An `` `

What are the best methods to develop dashboards for Websphere apllication server SystemOut.log ?

$
0
0
Hi All …, Send me some useful links about WebSphere application log monitoring in splunk , Found one link dated back in 2010 which is not working now( http://www.splunkbase.com/apps/Splunk+for+WebSphere+Application+Server ) for websphere application. The log format is SystemOut.log consists for info,error,warn type of events, any ideas about parsing it and apps for the dashboards ? Thank you all ..

Huge number of unclosed "TIME_WAIT" connections from Splunk logging for JavaScript

$
0
0
I have a data providing customer using the "Splunk logging for javascript" code located here : http://dev.splunk.com/view/splunk-logging-javascript/SP-CAAAFCV We have identified that their hosts when using this code create ~200k of ungracefully closed connections. These cause issues throughout the network as they pass firewalls and load balancing devices as these connections need to timeout naturally. I am trying to understand if this is because of incorrect use of this code OR a bug in which the connections are not nicely closed.

docker container monitoring performance with splunk commands?

$
0
0
I have configured splunk logging driver on . docker through HEC , I want to monitor each container health in the form of cpu utilization, memory and etc. how create dashboards for the docker containers? thanks.

How to put two pictures in one line

$
0
0
How to put two pictures in one line ![alt text][1] [1]: /storage/temp/254667-一行显示图形.png

transaction command: How to group events ONLY on specific conditions?

$
0
0
We have got a system, whereby an event-pairing occurs only for specific type of messageId event=1 messageId=100 requestor=human1 event=2 messageId=200 requestor=human2 event=3 messageId=201 requestor=human2 event=4 messageId=300 requestor=human3 event=5 messageId=300 requestor=human4 event=6 messageId=300 requestor=human4 In above example, we need to group the events ONLY if the messageId is 20* (ie in 200's)and based on requestor. Currently the simple query is: ... | transaction requestor Looking for output something like.. So event=2 and event=3 will be a single transaction event=1 messageId=100 requestor=human1 event=2 messageId=200 requestor=human2 event=3 messageId=201 requestor=human2 event=4 messageId=300 requestor=human3 event=5 messageId=300 requestor=human4 event=6 messageId=300 requestor=human4 I'm looking for something ... | transaction requestor where messageId=20* PS: I **don't** want to group for messageId=300 even if its same requestor (event 5 & 6) Ideally looking for transaction to be done only on specific events without needing multiple queries on raw data Any ideas/tricks to do this?

I see the elow error message could please help in this case

$
0
0
Indexer Clustering: The search process with sid=rt_md_1533830226.207365 on peer=XXXXXX may have returned partial results due to a reading error while waiting for the peer. This can occur if the peer unexpectedly closes or resets the connection during a planned restart. Try running the search again. Learn more.

Transforms, REGEX and FORMAT issues

$
0
0
Hi, I want to use REGEX and FORMAT strings for an xml sample as given without using KV_MODE=xml So i am trying to use different regex to get hold of parsing fields but failing Please find the sample log for your reference and help -80.03107887624853,25.351308629611Interdiction6Assured2013-11-0304:40:00Infiltrators: Savanna Carrera, Gregoria Farías, Julina Abeyta, Mariquita Alonso, Urbano Briseño, Victoro Montano 3Raft-80.33045250710296,24.93574264936793Interdiction9Pompano2013-05-0404:22:000-80.30497342463124,24.07890526980327Rustic-79.94720757796837,24.82172611548247Interdiction12Barracuda2013-01-0105:22:00Infiltrators: Cristian Caballero, Vicenta Olivares, Leonides Cintrón, Ascencion Betancourt, Alanzo Arenas, Primeiro Sánchez, Serena Monroy, Madina Mojica, Consolacion Cordero, Faqueza Serrano, Grazia Quesada, Ivette Partida 0Rustic **Props.conf** [dreamcrusher] LINE_BREAKER = (\) TIME_PREFIX = TIME_FORMAT = %Y-%m-%d<\/ActionDate>[\r\n]\t+%H:%M:%S SHOULD_LINEMERGE = false MAX_DAYS_AGO = 2500 SEDCMD-aremoveheader = s/\<\?xml.*\s*\\s*//g SEDCMD-bremovefooter = s/\<\/dataroot\>//g REPORT-f = dream_attack KV_MODE = none **transforms.conf** [dream_attack] REGEX = (?m)^[^<]+.(.*?)\>([\S\s]*?)\<(?=[^\s]) FORMAT = $1::$2 Please suggest me why i am failing? Thanks

動的なアラート条件は作れますか?

$
0
0
毎日9時と21時に12時間以内に取り込んだデータから該当するモノがあった場合メールを送るようなアラートを想定しています。 その際の検索条件なのですがローカルファイルにある対象製品リストから製品名を取得し検索を掛ける事は可能でしょうか? また製品リストは複数あり、それぞれメール送信先を分けたいと考えています。 上手い実装方法が思いついていないのですがScriptなどを作らないと対応出来ないのでしょうか。

How to add custom icons in charts

$
0
0
One of my dashboard design having lots of charts. In that, I am using a few icons. So how to add custom icons in Splunk chart

Timechart all values and one specific

$
0
0
Hey guys and girls, I am trying to create a diagram witth follwing input: I have two queries *search index= blabla host =* | timechart sum(bytes) search index=blabla host="*youtube*"| timechart sum (bytes)* for both of the searches i get a wonderfull timechart. My issue is to combine them in a one time chart Y -Axis amout of bytes X- Time and two bars: all hosts and a specific (youtube). ------------------------------------------------------------------------ I tried append/ appendcols I tried *index...| where host=* OR host =youtube | timechart...* Did not work

How to throttle alerts for 15 min delay?

$
0
0
I have used this query for the alert creation. index = xyz sourcetype=abc |table _time response_time|search response_time>50 I have used corn schedule for 5 min. But this creates lot of noise. So I want to use throttle for this alert for 15 min. Means after the first alerts triggered, it will take a 15 mins dealy. I have used below configuration for each result triggered. Throttle : "Checked" Suppress results containing field value: "response_time" Suppress triggering for : 15 mins But this is not working. Please help.

Can you skip the first x rows returned in a search

$
0
0
Hi, If I have a query which returns 100 rows I'd like to be able to only get rows 11-100 shown (and if 200 only rows 11-200) I have looked for an `offset` command similar to `head` or `tail` but I can't see one. Do you know how I could go about this? Thanks

"Returned partial results" error message

$
0
0
Indexer Clustering: The search process with sid=rt_md_1533830226.207365 on peer=XXXXXX may have returned partial results due to a reading error while waiting for the peer. This can occur if the peer unexpectedly closes or resets the connection during a planned restart. Try running the search again. Learn more.

Javascript, css documentation for Splunk

$
0
0
Hello everyone. I'm looking for a tutorial, documentation for javascript and css in Splunk. I mean, something that help me to know properties, methods and something like that for javascript in Splunk. In the other hand, something that help me to know id names, class names for css customization. I'm looking for in internet but I don't good results. Can you help me? Thank you in advance P.D: Sorry my english is not well, I'm chilean.

Kinesis Firehose - Could not connect to the HEC endpoint

$
0
0
We are trying to send data to Splunk HEC via Kinesis Firehose but for some reason Firehose keeps logging "Could not connect to the HEC endpoint. Make sure that the HEC endpoint URL is valid and reachable from Kinesis Firehose." We've tried a combination of the following with no luck: https://hostname.test.com:8088 https://hostname.test.com:8088/services/collector https://hostname.test.com:8088/services/collector/raw We are referencing this post: [Power Data Ingestion into Splunk][1] which indicates the first https://hostname.test.com:8088 with a raw endpoint should have worked. I'm able to post events via curl using batch and the raw endpoint and json and the event endpoint. This tells me the ELB is working and forwarding events. So I'm wondering what others have set for their Splunk Cluster Endpoint and Splunk endpoint type in Firehose? Raw Endpoint: curl -k "https://hostname.test.com:8088/services/collector?channel=00872DC6-AC83-4EDE-8AFE-8413C3825C4C" -H "Authorization: Splunk token" -d '127.0.0.1 - admin [28/Sep/2016:09:05:26.875 -0700] "GET /servicesNS/admin/launcher/data/ui/views?count=-1 HTTP/1.0" 200 126721 - - - 6ms 127.0.0.1 - admin [28/Sep/2016:09:05:26.917 -0700] "GET /servicesNS/admin/launcher/data/ui/nav/default HTTP/1.0" 200 4367 - - - 6ms 127.0.0.1 - admin [28/Sep/2016:09:05:26.941 -0700] "GET /services/apps/local?search=disabled%3Dfalse&count=-1 HTTP/1.0" 200 31930 - - - 4ms 127.0.0.1 - admin [28/Sep/2016:09:05:26.954 -0700] "GET /services/apps/local?search=disabled%3Dfalse&count=-1 HTTP/1.0" 200 31930 - - - 3ms 127.0.0.1 - admin [28/Sep/2016:09:05:26.968 -0700] "GET /servicesNS/admin/launcher/data/ui/views?digest=1&count=-1 HTTP/1.0" 200 58672 - - - 5ms' Events Endpoint: curl -k "https://hostname.test.com:8088/services/collector?channel=00872DC6-AC83-4EDE-8AFE-8413C3825C4C" -H 'Authorization: Splunk token' -d '{"event": "Hello"}' [1]: https://www.splunk.com/blog/2018/01/12/power-data-ingestion-into-splunk-using-amazon-kinesis-data-firehose.html

Dahsboard Drill-down not working correctly with conditions

$
0
0
Hey all, I am trying to make a conditional drill down for a table. The problem is it only ever picks up the hostname condition by itself. The severity condition it acts like it is not even there. For example, the hostname when clicked will pen a new tab, when clicked on a severity it just runs the auto search and completely bypasses the condition that is set. Is there something wrong with my XML? I am a bit of a novice at this...$click.name2$$click.value$search?q=index=NIM sourcetype=message severity!=clear severity!=severity hostname=$selected_hostname$ severity=$selected_severity$&earliest=$TIME.earliest$&latest=$TIME.latest$$click.value$search?q=index=NIM sourcetype=message severity!=clear severity!=severity hostname=$selected_hostname$&earliest=$TIME.earliest$&latest=$TIME.latest$ Thanks!
Viewing all 47296 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>