Quantcast
Channel: Questions in topic: "splunk-enterprise"
Viewing all 47296 articles
Browse latest View live

Tab Focus issue in dashboard

$
0
0
we have created dashboard in splunk using tabs as per below URL and its perfectly working fine. https://www.splunk.com/en_us/blog/tips-and-tricks/making-a-dashboard-with-tabs-and-searches-that-run-when-clicked.html Dashboard was created in 7.0 version but recently splunk has been upgraded to 7.3. Since upgrade we have been facing issue with the tab focus. That means, when we click on any tab, a blue line is shown under the tab to know, user is on which tab but when user clicks on another tab, blue line remain on previous tab as well as comes on new tab. That means if user clicks on multiple tabs one by one then for each clicked tab there are blue lines which becomes confusing for user. Ideally, when user clicks on new tab, blue line(focus) should get removed from previous tab and should be always be on the latest clicked tab. Issue seems to be either with tabs.css or tabs.js but we are unable to identify it. Can some one look into these two files from the above link and suggest what can be modified to rectify this error. Thanks in advance!

Trigger alert on value from predict calculation

$
0
0
Hi, I am trying to build an alert from the following query. The query collects the counters for memory usage, especially the free amount. It plots a time chart of the last 21 days and performs a prediction over the coming 14 days. The graph itself is perfect. It also shows in the prediction that in the next 14 days we run out of memory. ![alt text][1] index=xxxxx host=xxxxx source="Perfmon:Memory" counter="Available MBytes" | eval Value=(Value/1024) | timechart span=1d avg(Value) as "Available MBytes", latest(host) as host, latest(counter) as counter | lookup resource_thresholds.csv resource_name AS host, resource_metric AS counter OUTPUTNEW resource_threshold_warning,resource_threshold_critical | eval Warning=resource_threshold_warning | eval Critical=resource_threshold_critical | predict "Available MBytes" as Prediction future_timespan=14 | eval Prediction = round(Prediction,0) | fields - lower95(Prediction), upper95(Prediction) resource_threshold_warning resource_threshold_critical host counter I want to run this as a scheduled alert (email, MS Teams) every night and be informed when the prediction hits 0 or lower somewhere in the future 14 days in this case. For some reason I cannot seem to get my head around the logic here to trigger the alert. Any suggestions? [1]: /storage/temp/285685-capture.png

App: Broken Hosts App for Splunk, servers are going down and coming up and then normally working fine after checked in Splunk site.

$
0
0
Hi, Continuously getting Splunk forwarder service agent alerts in ticketing tool for every week. and then I tried to check-in Splunk site and it was showing as **server was not shut down or rebooted** means Splunk agent able to get logs then I need to close that request. like that, getting too many requests. what might be the issue of whether servers are restarting or Splunk agent issue? I have checked in Splunkd logs also but no error information. for some servers, I don't have privileges to check the logs. please provide some error information as you know. which errors we can get for Splunk Universal Forwarder usually(send me some examples of errors). can someone please suggest to me what I can do. Thanks in Advance.

First and Last event of Transaction

$
0
0
Hi, I am working on a query where I need to join some events using a transaction command in Splunk. Below is my query where I am joining a particular web service request with a response using a "requestID" and then extracting the data. Now what happens is if the response contains an error, it will again try and may be next time it gets success. requestID remains same here. Right now this query is just using the 1st response event which it encounters and reported as error even if it is not. How do i extract the last of the responses so that i get the updated data whether it resulted in an error or success. index=temp ("SoapMessage" "GetCustomerRequest") OR ("SoapMessage" "GetCustomerResponse") | rex field=_raw "\>(?[^\<]+)\<\/\w+?\:requestID\>" | transaction requestID startswith="GetCustomerRequest" endswith="GetCustomerResponse" keepevicted=true | search eventcount > 1

Custom Source Type - Group by Column in TSV file

$
0
0
I have a TSV file im uploading into Splunk, I'd like to be able to group by a column in the file itself. So far I'm using the Splunk Source Type UI to create the custom source type, used the field tab to label the columns and I'm missing the step to group by a column. Can anyone please advise? Screen shot shows the setup below, I'd like to group by Session ![alt text][1] [1]: /storage/temp/284687-screen-shot-2020-03-09-at-91811-am.png

Splunk forwarder on Linux won't show login when required (and also not able to phone home)

$
0
0
I've installed the forwarder on Ubuntu and it did get the apps from the deployment server right after the install. But it does not get any updates - it cannot phone home. What the root cause is, I'm still not yet sure, but for some reason, whenever I type a command on the forwarder that requires you to provide a valid username/password nothing happens. The cli does not show the request for the **Splunk username:** as it does on any of the Windows forwarders we have installed. I'm pretty sure I will solve the phone home issue if I can solve the issue with username/password not showing, but no luck yet doing that.

How to hide/remove Create New Dashboard button only for user Role

$
0
0
How to hide and remove Create New Dashboard button only for user Role.

disk space allocation for newly created index

$
0
0
will at the time of index creation the defined disk size allocated once. or it is allocated based on index utilization.

How to know what buckets are frozen due to size

$
0
0
I got an alert that some of the indexes buckets have been freezed due to size.How to get the bucket details .I mean the date of the buckets that got frozen

multi text input for search with a date, source, and location dropdowns

$
0
0
I am currently working on a dashboard that will simplify the search for some of our office personnel who are not Splunk savvy. I am creating a dashboard that has three drop down and six text inputs in order to ensure they are getting the specific results they are looking for, however I am not sure if the code is working and why the submit button are not working. I am very new to XML and any help would be appreciated. my code: Splunk made simple @dnowchoclatesveggiescakespiesAllFoodfood_nameindex=goodies source=$source_token$ | stats count by food_name@dnow$user_tok$$uid_tok$$src_tok$$dst_tok$$junkfood_tok$$snack_tok$Panel 1index=goodies source=$token_time$ | fillnull value=NULL food_name, user, uid, src, dst, junkfood, snack | table food_name, user, uid, src, dst, junkfood, snack |$time_token.earliest$$time_token.latest$

What is the price for SPLUNK APP FOR VMWARE after the 60-DAY FREE TRIAL?

$
0
0
I want to know What is the price for SPLUNK APP FOR VMWARE after the 60-DAY FREE TRIAL? I checked splunkbase and this is the answer THE SPLUNK APP FOR VMWARE IS AVAILABLE FOR A 60-DAY FREE TRIAL. If you wish to use the Splunk App for VMware beyond the trial, please contact your Splunk sales person.

Why doesn’t the Archive Processor verify if there are new unread events within my archive file?

$
0
0
In my use-case my source log (tailed by a monitor input stanza) is being archived once a day at midnight and the resulting archive file is tailed by the same input stanza and the the original source log is being deleted. What I noticed is, if the splunk instance monitoring that source goes down while new events are still being written to the source log and if the splunk instance comes back up again only after the original file has been archived and the source log deleted, then the Archiving processor doesn’t verify if any new unread events can be found within the archive which the Tailreader couldn’t read (as during that time the splunk instance was down), please check following example: 02-05-2020 12:53:00.442 +0000 INFO ArchiveProcessor - Handling file=/etc/ArchiveFolder/sourcelog5.log.gz 02-05-2020 12:53:00.443 +0000 INFO ArchiveProcessor - reading path=/etc/ArchiveFolder/sourcelog5.log.gz (seek=0 len=784) 02-05-2020 12:53:00.499 +0000 INFO ArchiveProcessor - Archive with path="/etc/ArchiveFolder/sourcelog5.log.gz" was already indexed as a non-archive, skipping. 02-05-2020 12:53:00.499 +0000 INFO ArchiveProcessor - Finished processing file '/etc/ArchiveFolder/sourcelog5.log.gz', removing from stats 02-05-2020 13:01:31.503 +0000 INFO WatchedFile - Will begin reading at offset=12392 for file='/etc/ArchiveFolder/sourcelog5.log.gz'. Based on the documentation: https://docs.splunk.com/Documentation/Splunk/8.0.2/Data/Howlogfilerotationishandled I would understand that both the Tailing and the Archiving processor should behave the same, but apparently that is not the case here. I also did the complementary test and extracted again the source log within the archive and at that point the Tailing processor realises that there are effectively still some new unread events and it it will start ingesting those at that stage. Why is the Archiving processor missing those new unread events?

Table coloring with Mutli-value Fields

$
0
0
Guys, have one old Splunk 6.1.4 instance that I cannot decommission for a while (won't go into details :| ). I was looking at customizing the field colors some of my simple XML generated tables using the tables examples here `https://splunkbase.splunk.com/app/1603/` but this example works only for single value fields and mine are multi-value. Anyone have an example for mutli-value fields? I'm a JavaScript noob!

Make panels dynamically adjust based on screen size to keep layout the same

$
0
0
I would like to keep this layout regardless of screen size ![alt text][1] when I go to a smaller screen it adjusts to this: ![alt text][2] how can I fix its layout so I does not change layout on different screens TIA [1]: /storage/temp/285695-view1.png [2]: /storage/temp/285696-view-2.png

Make panels dynamically adjust based on screen size to keep layout the same

$
0
0
I would like to keep this layout regardless of screen size ![alt text][1] when I go to a smaller screen it adjusts to this: ![alt text][2] how can I fix its layout so I does not change layout on different screens TIA [1]: /storage/temp/285695-view1.png [2]: /storage/temp/285696-view-2.png

Make panels dynamically adjust based on screen size to keep layout the same

$
0
0
I would like to keep this layout regardless of screen size ![alt text][1] when I go to a smaller screen it adjusts to this: ![alt text][2] how can I fix its layout so I does not change layout on different screens TIA [1]: /storage/temp/285695-view1.png [2]: /storage/temp/285696-view-2.png

Trace a value in Splunk / data lineage

$
0
0
Hi, is there a way to trace the origin of a specific value in Slunk? Currently I am trying to figure out with eventtype, lookup or eval is setting a tag and a field value for some events in Splunk. I used the btool the figure out, if the are some evals. But they do not apply. I found some lookups, but these do not contain the value I am looking for. A code trace or data lineage function would be very helpfull sometimes. Does anyone know a function in Splunk or an app for this? Thank you.

How to search events happened before a particular statement in the log file

$
0
0
Hi All, I am looking for a way to display the events which appeared before a particular error is written into the log files (for that particular error there is a configured alert). That's the alert: index=**** message="*Interface Broker Configuration Service error: No result retrieved from config service*" First I tried with localize but was not able to get a result, only this one: ![alt text][1] [1]: /storage/temp/285688-localize.jpg And I don't know exactly how to filter the events which are written in the same log 5s or 10 s earlier before the error message occurs. Another option was the combination of eval + map based on other questions posted on Splunk community but Splunk was not able to return a value: | eval starttime=_time-180 | eval endtime=_time+1 | map search="search index=* earliest=$starttime$ latest=$endtime$" Do you have any suggestions? Cheers, Konstantin

wget link for barracuda app

$
0
0
i am trying to find out the wget link for Barracuda WAF/ADC Add-on for Splunk but not able to find it :( below add-on https://splunkbase.splunk.com/app/3776/

Populate Table with Previously Formatted Search Results

$
0
0
Hello, I'm starting this post with a shoutout to @niketnilay because I used one of his post as the basis for my dashboard. However, input from any/all Splunkers out there is appreciated. Here is my code, modified from niketnilay's post. [How to show table result in one page/ table modification][1] Show Table Results in One Page index=oit_printer_monitoring AND type=Printer | eval timeConvDate=strftime(_time,"%a %m-%d-%Y") | eval timeConvTime=strftime(_time,"%H:%M:%S") | eval statusNum=case(status="printing,deleting,error",4,status="error,toner low",4,status="printing,error",4,status="paper jam",4,status="no toner",4,status="error,offline",4,status="error",4, status="door open,error",3,status="spooling,paused",3,status="paused",3,status="out of paper",3,status="error,out of paper",3,status="offline",3,status="door open",3, status="toner low",2,status="restarted",2, status="printing,deleting",1,status="printed,deleting",1,status="printing,printed,deleting",1,status="error,warming up",1,status="spooling,printing",1,status="warming up",1,status="spooling",1,status="printing",1,status="normal",1) | sort - statusNum, status | fields printer, status, statusNum, timeConvDate, timeConvTime | dedup printer | eval printer="#".printer | eval component=mvzip(printer,mvzip(status,mvzip(timeConvDate,timeConvTime,"..."),"..."),"...") | stats values(component) as component | nomv component | eval component="
".replace(component,"#","
")."
" | makemv delim="..." component | table component
...... Explanation. Create two new fields for time and date. ` | eval timeConvDate=strftime(_time,"%a %m-%d-%Y") | eval timeConvTime=strftime(_time,"%H:%M:%S") ` Create a new field to represent the status as a number that can be sorted later. `| eval statusNum=case(status="printing,deleting,error",4,status="error,toner low",4,....` Append a "**#**" in front of my first field, printer, to establish the beginning of a new field **component***. `| eval printer="#".printer ` The field **component** will be concatenation of several other fields: **printer**, **status**, and the **timeConvDate** and **timeConvTime** fields as one. `| eval component=mvzip(printer,mvzip(status,mvzip(timeConvDate,timeConvTime,"..."),"..."),"...")` I used "..." instead of "\|" between each of the concatenated fields. The next two lines are from niketnilay's code unchanged. `| stats values(component) as component | nomv component ' Modified niketnilay's eval/replace code as follows: `| eval component="<div>".replace(component,"#","</div><div>")."</div>"` By using the "..." all 4 fields stay associated to each other, and the "#" indicates of the start of the field **component**. Replaced the "..." within the field component with a carriage return/newline. `| makemv delim="..." component ` *Before continuing, I have a question about the field named ***component***. When I substituted ***component*** with my field name, ***printerResult***, it did not work. I had substituted in the js code as well. Therefore, I used ***component*** instead. My question is, in the js code, the word ***Components*** is used (plural and upper case C). Is this a special variable name for js and that is why it was used?* I am using **display_token_with_html_content.js** as written. require([ "jquery", "splunkjs/mvc", "splunkjs/mvc/simplexml/ready!" ], function ( $, mvc ) { var defaultTokenModel = mvc.Components.get("default"); defaultTokenModel.on("change:tokResultsInHTML", function (model, tokResultsInHTML, options) { if (tokResultsInHTML !== undefined) { $("#htmlTokenContainer").html(tokResultsInHTML); } }); }); I used niketnilay's css in a panel Applying HTML Style $tokResultsInHTML$.... Lastly, I created another panel with just the token value assigned earlier per the niketnilay example. Format Data as desired output and show as html
.... Here is a screenshot of my results. ![Printer Dashboard Issue][2] What I am trying to accomplish is placing each value of **component** into individual cells. The formatting would be all centered. As the final requirement click the printer name in any one of the cells would set a token, which displays another panel (depends="token" ) and populates the panel with data specific to the printer clicked. Thanks and God bless, Genesius [1]: https://answers.splunk.com/answers/662523/how-to-show-table-result-in-one-page-table-modific.html [2]: /storage/temp/284688-printer-dashboard-issue.jpg
Viewing all 47296 articles
Browse latest View live


Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>