Activity Feed
- Posted How to split a field into two different fields using eval in Splunk? on Splunk Search. 05-12-2023 06:59 AM
- Posted How to combine 2 fields into 1 in Splunk in an alternate approach? on Splunk Search. 05-05-2023 07:50 AM
- Posted How to combine 2 fields into 1 in Splunk in an alternate approach? on Splunk Search. 05-05-2023 07:29 AM
- Posted Splunk time format conversions? on Splunk Search. 05-03-2023 08:39 AM
- Posted How to manually save a saved search which contains backslashes \ in the query to savedsearches.conf? on Splunk Search. 02-17-2023 08:10 AM
- Posted Re: How to extract some fields from an existing field which has backslashes? on Splunk Search. 02-10-2023 10:38 AM
- Karma Re: Struggling to extract some fields from an existing field which has backslashes for yeahnah. 02-10-2023 10:38 AM
- Posted How to extract some fields from an existing field which has backslashes? on Splunk Search. 02-08-2023 05:07 PM
- Karma Re: Can't I use backslashes in Splunk searches? for richgalloway. 02-08-2023 12:09 PM
- Posted Can't I use backslashes in Splunk searches? on Splunk Search. 02-08-2023 11:10 AM
- Tagged Fix Python Compatibility issues with Eventgen? on All Apps and Add-ons. 09-21-2022 07:28 AM
- Posted Fix Python Compatibility issues with Eventgen? on All Apps and Add-ons. 09-19-2022 08:11 AM
- Posted Extract a field from a field in splunk? on Splunk Search. 08-08-2022 01:06 PM
- Posted Re: How to convert the time and calculate the difference in a query? on Getting Data In. 07-12-2022 11:51 AM
- Posted How to convert the time and calculate the difference in a query? on Getting Data In. 07-12-2022 10:57 AM
- Posted How to apply replicationblacklist for a particular app in distsearch.conf? on Getting Data In. 06-27-2022 06:32 PM
- Got Karma for Splunk query to list all the knowledge objects that use splunk internal indexes(_*) ?. 05-24-2022 10:36 PM
- Karma Re: how to convert a field value of single line to displayed as multilines? for bowesmana. 04-11-2022 02:07 PM
- Karma Re: how to convert a field value of single line to displayed as multilines? for richgalloway. 04-11-2022 02:06 PM
- Posted How to convert a field value of single line to displayed as multilines? on Splunk Search. 04-10-2022 04:28 PM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
05-12-2023
06:59 AM
I have a field as follows in the logs user="userAbc1 (host1234)"
As you can see both the username and hostname fields are together in the user field. Now how do I apply regex and separate both the fields into 2 corresponding fields as follows user=userAbc1
host=host1234
... View more
Labels
- Labels:
-
eval
-
field extraction
-
fields
-
regex
-
rex
05-05-2023
07:50 AM
I have a Splunk search outputs result as follows. Details link Product Details : Product 1:- ABC123 Product 2:- DEF456 abcd_website Now how do I combine both the fields into 1 as follows Details link Product Details : Product 1:- ABC123 link:- abcd_website Product 2:- DEF456 abcd_website The below eval condition giving me the result as follows | eval Details = Details + link Details link Product Details : Product 1:- ABC123 Product 2:- DEF456 link:- abcd_website abcd_website I do not want to add that link at the end. but wanted that somewhere in the middle after a specific field. Also, I do not want to touch or edit the Details field although thats an easy way but it comes from a macro and which used by many searches. I am looking for an alternate way, so that I can update the Details for a specific search?
... View more
05-05-2023
07:29 AM
I have a Splunk search outputs result as follows. Details link Product Details : Product 1:- ABC123 Product 2:- DEF456 abcd_website Now how do I combine both the fields into 1 as follows Details link Product Details : Product 1:- ABC123 link:- abcd_website Product 2:- DEF456 abcd_website The below eval condition giving me the result as follows | eval Details = Details + link Details link Product Details : Product 1:- ABC123 Product 2:- DEF456 link:- abcd_website abcd_website I do not want to add that link at the end. but wanted that somewhere in the middle after a specific field. Also, I do not want to touch or edit the Details field although thats an easy way but it comes from a macro and which used by many searches. I am looking for an alternate way, so that I can update the Details for a specific search?
... View more
Labels
- Labels:
-
eval
-
fields
-
join
-
transaction
05-03-2023
08:39 AM
How do I convert the below time format 2023-05-02T02:35:47Z into 2023-05-03 15:37:22
... View more
02-17-2023
08:10 AM
I have a splunk query as below which contains a lot of backslashes index="ABC" os="Win" FileName="*\\Programs\\Startup\\*" | rex field=FileName "Users\\\(?<username>[^\\\]+)." Now, I now that when I tried to add this in savedseacrhes.conf it wont work as expected as in Splunk it breaks the line when it sees backslash. Any suggestion on how we can add it to saved searches.conf ?
... View more
Labels
02-10-2023
10:38 AM
Thanks a Lot @yeahnah . Although the field extraction for file_destination isn't working as expected. As you see below file destnation is extracting "program\Send to OneNote.lnk" but I just wanted to extract "Send to OneNote.lnk" just the last file name which comes at the end of the field and just after the last backslash.
... View more
02-08-2023
05:07 PM
I have a field called folder_path which gives the values as follows.
folder_path
\Device\XYZ\Users\user_A\AppData\program\Send to OneNote.lnk
\Device\RTF\Users\user_B\AppData\program\send to file.Ink
Now I wanted to extract the following fields from the field "folder_path"
username
file_destination
user_A
Send to OneNote.lnk
user_B
send to file.Ink
whereas for extracting username as shown in the example it is extracted after the string "Users\", Simmilarly for extracting file_destination as shown in the example it is extracted after the lastbackslash ?
trying a few ways but couldn't properly extract the fields since it has backslashes.
... View more
02-08-2023
11:10 AM
I have a Splunk query as below which pulls some events. index="windows_events" TargetFileName="*startup*" Now from the events I picked the below TargetFileName field value \Device\HarddiskVolume3\Users\XYZ\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to AbC.lnk Now I wanted to search specifically for the above field and for that I used the below query which gives me no results. `get_All_CrowdstrikeEDR` event_simpleName=FileCreateInfo os="Win" TargetFileName="*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*" Now, what I dont understand is when I tried the first query I am able to see some events though I used wild cards before and after startup Now, when I extended the wild card with actual value why isn't working? Can't I use backslashes in Splunk searches?
... View more
Labels
- Labels:
-
field extraction
-
fields
-
join
-
stats
-
timechart
09-19-2022
08:11 AM
Hello,
I have installed a Eventgen App from Splunk base to our Heavy forwarder. The following are the details
SA-EVENTGEN Version :- 7.2.1
Splunk Version :- 8.1.1
After installation. I am seeing the follow error messages related to the eventgen
ERROR ExecProcessor - message from "/cs/splunk/forwarder/bin/python3.7 /cs/splunk/forwarder/etc/apps/SA-Eventgen/bin/eventgen.py" SyntaxError: Missing parentheses in call to 'print'. Did you mean print('\n\nCaught kill, exiting...')?
ERROR ExecProcessor - message from "/cs/splunk/forwarder/bin/python3.7 /cs/splunk/forwarder/etc/apps/SA-Eventgen/bin/eventgen.py"
ERROR ExecProcessor - message from "/cs/splunk/forwarder/bin/python3.7 /cs/splunk/forwarder/etc/apps/SA-Eventgen/bin/eventgen.py" print '\n\nCaught kill, exiting...'
ERROR ExecProcessor - message from "/cs/splunk/forwarder/bin/python3.7 /cs/splunk/forwarder/etc/apps/SA-Eventgen/bin/eventgen.py" File "/cs/splunk/forwarder/etc/apps/SA-Eventgen/bin/eventgen.py", line 113
Does anyone face the similar issue with SA-Eventgen? Looks like the Python version in Eventgen is no compatible or having some issues.
Any idea on how to troubleshoot or resolve these issues?
... View more
Labels
- Labels:
-
configuration
-
development
-
troubleshooting
08-08-2022
01:06 PM
I have a field names "code_value" which has the values as follows code_value
ABC-123 JHLIK
ABC-456 LKJF
ABC-781 klklk
ABC-22 olsd Now how do I extract the code_value field anything that comes before a space? something like below new_field_derived_from_code_value
ABC-123
ABC-456
ABC-781
ABC-22
... View more
Labels
- Labels:
-
field extraction
07-12-2022
11:51 AM
Thanks for the response. the regex provided didn't worked. Let me provide the full syntax of the Description below Last event received from host_1 (ABCD-1234): 2022-12-06 23:59. logtype=ABC
... View more
07-12-2022
10:57 AM
Hello Splunkers, I have a query as follows My query blah blah blah |stats latest(description) as description latest(result) as result latest(object) as object by host source _time which gives the result as follows As highlighted with yellow color on the above results there are two different time values one under _time and the other under description. Now I want to filter the results for the hosts that has more than 24 hours in the difference between _time and the time in the description. Something like below difference time = (_time - time_in_the_description) > 24 hours
... View more
Labels
- Labels:
-
field extraction
-
time
06-27-2022
06:32 PM
On my replication bundle I have a whole list of unwanted files that exists from a particular App "XYZ" which are as shown below apps/XYZ/bin/suds/mx/typer.pyc
apps/XYZ/bin/suds/mx/encoded.py
apps/XYZ/bin/suds/mx/__init__.pyc
apps/XYZ/bin/suds/mx/literal.py
apps/XYZ/bin/suds/mx/__init__.py
apps/XYZ/bin/suds/options.py
apps/XYZ/bin/suds/sudsobject.py Now, how can i apply replicationblacklist to anything that is under the APP "XYZ" ? distsearch.conf [replicationBlacklist]
....
... View more
Labels
- Labels:
-
blacklist
-
modular input
-
props.conf
04-10-2022
04:28 PM
Hi Splunkers,
I have defined a filed as follows using eval condition
| eval body = "Sample Example :-" .
" ---- " . " HOST INFORMATION: " .
" ---- Source Network Address: " . src .
" ---- Source Network Hostname: " . srcdns_hostname .
" ---- " . " END "
which produces the result as follows
Now, I would like to change the above result into the below format how can I achieve that
Sample Example :-
HOST INFORMATION:
Source Network Address: 1.1.3.5
Source Network Hostname: ABCD.net
END
... View more
Labels
- Labels:
-
eval
-
field extraction
-
fields
-
regex
-
rex
04-06-2022
03:54 PM
I have a field value in splunk with the below format :- field_X = "AB 012 - some text here! ---- HOST INFORMATION: ---- Source: 1.1.2.3 ---- DETAILS: -- Destination ports: 777 33 -- Occurrences: 2244 -- Destination ip counts: 146 -- Actions: blocked -- Order Techniques : X3465 " Now How can I split the abpve field value into multiple lines to make it more user redable using eval and regex field_X =
AB 012 - some text here!
HOST INFORMATION:
Source: 1.1.2.3
DETAILS:
Destination ports: 777 33
Occurrences: 2244
Destination ip counts: 146
Actions: blocked
Order Techniques : X3465 All I wanted is replace "--" with a line space or something to divide the field into multiple lines from 1 line?
... View more
Labels
- Labels:
-
field extraction
03-30-2022
07:37 PM
Thanks @gcusello for the quick response. Apologies for the confusion. To your question :- No, My macro contains nothing but the lookup and some filtering which produces the results as follows indexes
index IN ("ABC","DEF") Now I wanted to use the macro's results as a subsearch. Now, I cannot use the lookup directly as I have too many indexes. All I wanted to take into account for the subsearch is just as below index IN ("ABC","DEF") but for now as I have a column name as indexes I am getting the subsearch as below which ending up with an error indexes=index IN ("ABC","DEF") Now, is there any way to tweak my subsearch or macro take the below into account which will work? index IN ("ABC","DEF") Where as my full search would be something like below after expanding the macro My_Search | where index IN ("ABC","DEF")
... View more
03-29-2022
08:39 PM
I have a macro named X that uses the lookup in the search and produces the results as follows indexes
index IN ("ABC","DEF") where as indexes is column name Now I want to use the macro X result (index IN ("ABC","DEF")) in a separate search as follows my_search | where `X`
which should execute as below
my_search | where index IN ("ABC","DEF") Now how can I achieve that?
... View more
Labels
- Labels:
-
subsearch
01-31-2022
04:54 PM
I have a Splunk dashboard as follows with some input fields. Now As you can see above by default the input value for host column is wild card * . Now, If I click the checkbox "show" under Latency validation check it will display a panel below it. Now, as a good practice how do I disable executing the search when some one used the wild card in host input as the input will be used as a token for the search. I mean only when a valid hostname is given as an input for Host the search should execute for the Latency Validation check. Note :- Here I need the wild card as a default entry for host input as there are some other panels which uses that wild card but I only wanted to restrict the use of wild card to only one particular panel. Code can be found below :- <input type="text" token="host">
<label>Host</label>
<default>*</default>
</input>
<input type="checkbox" token="overview">
<label>Latency Validation Check</label>
<choice value="true">Show</choice>
<change>
<condition label="Show">
<set token="overview">true</set>
</condition>
</change>
</input>
... View more
Labels
11-18-2021
09:48 AM
Hi I have the following command in my query My splunk search | eval message=IF((like(source,"ABC%") OR like(source,"DEF%")) AND avg_latency>120 ,"Host with more than 2 minutes Latency","") where avg_latency is a field with values but for some reason the above condition is not working for me. Could someone check if there is any format issue on my eval condition and let me know how I can make it correct?
... View more
Labels
10-21-2021
12:30 PM
I have a lookup sample.csv as follows whereas one of the host value is empty Name Host TEST_USER abc, def USER_1 * user_3 ghi Now I use the lookup in a search. Now for the USER_1 Host I want to use the wild card. Using astrick symbol directly in the lookup doesn't working. Is there any way I can add a wild card for USER_1. A little research on the Splunk docs gives me some inputs like I need to use props and transforms to do so. I don't have a props or transforms exists for that application. Can I create a condition in props, transforms just for the above purpose. If so what should be the stanzas should be in both the configuration files. Any Help would be great.
... View more
Labels
- Labels:
-
lookup
09-02-2021
07:14 PM
1 Karma
I have a csv file query as follows :- | inputlookup file_1.csv which gives the result as follows in a single line as a single field or column A B C D E F G H i j k l m n o p q r s t u v w x Now, I want to turn the above result as follows with multiple fields naming A, B,C,D,E,F,G,H basically what I am trying to acheive is convert the single field into multiple fields with each field name or field value is extracted based on a space separation in the single field from above? A B C D E F G H i j k l m n o p q r s t u v w x
... View more
Labels
- Labels:
-
eval
-
field extraction
-
regex
-
rex
07-12-2021
01:03 PM
Thanks for the solution. My event is multiple quoted string Also, the username field contains the value in the below similar format. A123456 For the scenario, does the second Regex works?
... View more
07-12-2021
12:26 PM
I have the event as follows 2021-07-12T18:40:56 host_abc MAIN 1 19 1.0.12.34 user_abc "ABCDEF GHIJ KLMN"................ From the above I am trying to extract the string which is between the double quotes which comes right after the username field where user_abc is a field value of username field.
... View more
Labels
- Labels:
-
field extraction
01-05-2021
08:30 PM
Can I use Web Terminal for Splunk (CLI) App in splunk to back fill summary indexes? If so, what could be the sample command to backfill using CLI?
... View more
Labels
- Labels:
-
using Splunk Enterprise
08-11-2020
01:15 PM
Hi I am not sure how to put up this question but all I am trying to do is basically hide the below "All" option from the dashboards page in an App. Right now, when someone clicks the "All" option it's showing all the existing dashboards from the other Apps to. Now I want to restrict this App to show only the "Your's" and "This App's". Check the below picture for better understanding.
... View more