Activity Feed
- Posted Create investigation in ES using SPL outputlookup command? on Splunk Enterprise Security. 11-17-2022 09:51 PM
- Posted Log translation when raw log is not English on Getting Data In. 02-16-2021 03:12 AM
- Posted How to distingusion where is the 4624 event was logged, on workstation AD or remote host? on Alerting. 01-05-2021 09:00 PM
- Got Karma for Error in 'eval' command: The expression is malformed. An unexpected character is reached at ') , user)'. Help Please. 10-29-2020 09:09 PM
- Got Karma for Re: Error in 'eval' command: The expression is malformed. An unexpected character is reached at ') , user)'. Help Please. 10-29-2020 09:09 PM
- Posted Re: Error in 'eval' command: The expression is malformed. An unexpected character is reached at ') , user)'. Help Please on Splunk Search. 10-29-2020 07:59 PM
- Posted Error in 'eval' command: The expression is malformed. An unexpected character is reached at ') , user)'. Help Please on Splunk Search. 10-22-2020 03:31 PM
- Got Karma for How to identify which host the user is trying to access by using windows DC log.. 06-05-2020 12:51 AM
- Karma Re: Display table issue for tiagofbmm. 06-05-2020 12:49 AM
- Got Karma for Re: How to get the average base on line number?. 06-05-2020 12:49 AM
- Got Karma for Re: Can Splunk find similar strings in a log?. 06-05-2020 12:49 AM
- Posted How to identify which host the user is trying to access by using windows DC log. on Splunk Enterprise Security. 03-05-2020 11:02 PM
- Tagged How to identify which host the user is trying to access by using windows DC log. on Splunk Enterprise Security. 03-05-2020 11:02 PM
- Posted Re: How do you extract fields from an existing field's value? on Splunk Search. 10-20-2018 06:24 PM
- Posted Re: How do you extract fields from an existing field's value? on Splunk Search. 10-20-2018 05:39 PM
- Posted Re: How do you extract fields from an existing field's value? on Splunk Search. 10-20-2018 05:13 PM
- Posted How do you extract fields from an existing field's value? on Splunk Search. 10-20-2018 02:52 PM
- Tagged How do you extract fields from an existing field's value? on Splunk Search. 10-20-2018 02:52 PM
- Posted Re: Boss of SOC V1 dataset: Why am I having a problem finding an event that I know is there? on All Apps and Add-ons. 08-26-2018 11:13 PM
- Posted Boss of SOC V1 dataset: Why am I having a problem finding an event that I know is there? on All Apps and Add-ons. 08-26-2018 03:41 PM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
1 | |||
1 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
11-17-2022
09:51 PM
Hi Everyone
I am trying to create an investigation in ES using SPL.
Since ES is most work as lookup/kvstore, so I try to run the following SPL
| makeresults
| eval class_name="investigation",
collaborators="[{\"name\": \"AAAAAA\", \"write\": true}, {\"name\": \"BBBBBB\", \"write\": true}]",
create_time=1668731443,
creator="CCCCCC",
description="DDDDDDD",
mod_time=1668731608,
status="[{\"name\": \"In Progress\", \"time\": 1668739809, \"id\": \"investigation:2\"}]",
title="EEEEEEE",
version=1,
comments="[]",
tags="[]"
| table class_name, collaborators, create_time, creator, description, mod_time, status, title, version, comments, tags | outputlookup append=true investigation
I am able to add an entry in the KV store, but when I load the investigation tab in ES is breaks and appear Error as "Expect an array" and not able to load the page
Has anyone done this before?
Is that the right way, or is there another way to use SPL to create an investigation?
... View more
Labels
02-16-2021
03:12 AM
Hi Everyone I have a some standard Windows log that is not in English, when I get the data in how can I translate it into English. Does Splunk can do this translation? Should it be done in the parsing phase when data getting in? Or should it be done in the searching phasing phase when writing correlation search ? Thank you for your help Cheers
... View more
- Tags:
- parsing
Labels
- Labels:
-
field extraction
01-05-2021
09:00 PM
Hi Everyone I am trying to detect RDP connection to a remote host. I read up some web post suggests looking for 4624 with logon type 10 event. I made an RDP to a remote host, however all 4624 evens I can see is logon type 3. Then I realize 4624 events can be collected from 3 places The workstation where the user phycially present The AD: where the authentication takes place The remote host: where the user wants to log in, which is the destination host. I am wondering whether the logon type 10 events only occur on the remote host and on the AD log the 4624 event will have logon type 3 instead. Anyone has come across this kind of situation before? Thank you for the help. Cheers Linsong
... View more
10-29-2020
07:59 PM
1 Karma
I find the problem is actually not the field name it is the result subsearch produced or I should say " | return $USER_NAME_FROM_ACEE return empty result which cause the search run as | eval actual_user=if((unc=1), user, ( ( "" ) ) | table actual_user and it caused error. find the root cause by adding "format" command at the end of my search index=indexA user=ABC123
| where isnotnull(USER_NAME_FROM_ACEE)
| table USER_NAME_FROM_ACEE
| dedup USER_NAME_FROM_ACEE
| return $USER_NAME_FROM_ACEE
| format
... View more
10-22-2020
03:31 PM
1 Karma
I have a search running fine by itself, index=indexA user=ABC123
| where isnotnull(USER_NAME_FROM_ACEE)
| table USER_NAME_FROM_ACEE
| dedup USER_NAME_FROM_ACEE
| return $USER_NAME_FROM_ACEE but if I put the search as a subsearch in if statement as below | eval unc=mvcount(user_num )
| eval actual_user=if((unc!=1),
[
index=indexA user=ABC123
| where isnotnull(USER_NAME_FROM_ACEE)
| table USER_NAME_FROM_ACEE
| dedup USER_NAME_FROM_ACEE
| return $USER_NAME_FROM_ACEE
],
user)
| table actual_user it will throw me the errro ""Error in 'eval' command: The expression is malformed. An unexpected character is reached at ') , user)'. I did test to simplify the search and find the problem is the filed name part"USER_NAME_FROM_ACEE" if I do | eval unc=mvcount(user_num )
| eval actual_user=if((unc!=1),
[
index=indexA user=ABC123
| table user
],
user)
| table actual_user it works fine, but if I do | eval unc=mvcount(user_num )
| eval actual_user=if((unc!=1),
[
index=indexA user=ABC123
| table USER_NAME_FROM_ACEE
],
user)
| table actual_user it will throw me the error, which totally does not make sense to me, any suggestion why it is like this?
... View more
Labels
- Labels:
-
subsearch
03-05-2020
11:02 PM
1 Karma
This question may not 100% related with Splunk but I am sure Splunker had done this many times so I thought I will just ask
I want to identify the real destination when user logon a host using authenticate through DC like Kerobers or NTLM. I looked at event 4624, 4768,4771 on the DC log, they only have real src information, but I cant find the real dest information in these event. Is there another event I should look at or it is some field is missing on these events? my example as below
user A using host A to logon to host C by go through DC B. and I only collect log at DC B, so I want to know how to identify the host C information from the log in this scenario.
Thank you in advanced.
... View more
10-20-2018
06:24 PM
fix the problem by change second one to
| rex field=work_notes max_match=10 "(?<full_comment>[\w\s\W\d]+?)(?:\|\|\|)"
not sure why, any suggestion?
... View more
10-20-2018
05:39 PM
Hi Raschko
I put your code against production log, the first rex works fine, added ||| into the string, but the second rex commend didnt return any value in full_comments field, any suggestion why?
I put the string value in your original code and it works fine as well
Thank you so much for your help
Cheers
Sam
... View more
10-20-2018
05:13 PM
This is amazing, didnt expect get answer this fast, you are great
... View more
10-20-2018
02:52 PM
I have a field that contains one long string looks like below
18/10/2018 03:42:26 - Chirs Lee (Work notes) commentxxx commentxxx commentxxx commentxxx 17/10/2018 23:14:04 - Sam Smith(Work notes) commentxxx commentxxx commentxxx commentxxx 17/10/2018 23:13:33 - Bob Bob(Work notes) commentxxx commentxxx commentxxx commentxxx 15/10/2018 23:13:33 - Chris Lee (Work notes) commentxxx commentxxx commentxxx commentxxx
This message is in one event, I want to extract 3 fields from this message: time, name, and comment which will look as below
time name comment
18/10/2018 03:42:26 Chirs Lee (Work notes) commentxxx commentxxx commentxxx commentxxx
17/10/2018 23:14:04 Sam Smith (Work notes) commentxxx commentxxx commentxxx commentxxx
17/10/2018 23:13:33 Bob Bob (Work notes) commentxxx commentxxx commentxxx commentxxx
15/10/2018 23:13:33 Chris Lee (Work notes) commentxxx commentxxx commentxxx commentxxx
Ideally, this one event will be split to multiple events, but I guess if it is acceptable as a field with multi value field.
My final goal is that, later on, I will be able to search what comment a user (Chirs Lee) put in the job.
Any suggestion how I can extract the string from this field?
... View more
08-26-2018
11:13 PM
Hi DalJeanis
I am not quick get it it I triple checked the first search is "poisonivy-is-coming-for-you-batman.jpeg" and the second query is search sourcetype=suricata src_ip=192.168.250.70 | table url | search url=*batman* if you refer to the actual field is http.url I did the same search as well search sourcetype=suricata src_ip=192.168.250.70 | table http.url | search http.url=*batman* it have the same problem. plus I can see both field have the value.
... View more
08-26-2018
03:41 PM
Hi Everyone,
I am practicing the event and having problem doing search on the dataset. When I just search the answer, I can see the event, but when I use Splunk search query, the answer is not appearing for some reason.
Question:
What is the name of the file that defaced the imreallynotbatman.com website? Please submit only the name of the file with extension (For example "notepad.exe" or "favicon.ico")
Answer is poisonivy-is-coming-for-you-batman.jpeg
so if I just search poisonivy-is-coming-for-you-batman.jpeg it gives me two events
However when I do search sourcetype=suricata src_ip=192.168.250.70 | table url | search url=*batman* it does not give me that event and this happens to a lot of questions. Any suggestions of what is happening?
updated to mark code for you - dmj
... View more
08-25-2018
10:04 PM
the regex does not make any different.
... View more
08-25-2018
10:03 PM
Hi ddrillic
I tried run your query it got the result as you mentioned but it is not the only string in the value, so I did
eval _raw=work_notes | rex field=_raw "^\d{2}\/\d{2}\/\d{4}\s\d{2}:\d{2}:\d{2}\s-\s(? .+?(?=\d{2}\/\d{2}\/\d{4}\s\d{2}:\d{2}:\d{2}\s-\s))"
| table lastcomment
it still come out with the same problem
... View more
08-25-2018
01:32 AM
Hi
I have a field with following value
16/08/2018 03:04:11 - Christian (Work notes) Remote Desktop Notes: - still unable to remote in to the machine 10/08/2018 07:11:53 - Christian (Work notes) Remote Desktop Notes: - machine is offline - 08/08/2018 01:11:53 - Sam (Work notes) Remote Desktop Notes: - machine is comprimised
This is all job comments relate with the work and I want to get the last comment only of the job which will be the string between the first and second timestamps
- Christian (Work notes) Remote Desktop Notes: - still unable to remote in to the machine
I tried use following regex in regex101.com, it seems works fine.
^\d{2}\/\d{2}\/\d{4}\s\d{2}:\d{2}:\d{2}\s-\s(?<lastcomment>.+?(?=\d{2}\/\d{2}\/\d{4}\s\d{2}:\d{2}:\d{2}\s-\s))
But when I put the rex into the query it does not return anything
... | rex field=work_notes "^\d{2}\/\d{2}\/\d{4}\s\d{2}:\d{2}:\d{2}\s-\s(?<lastcomment>.+?(?=\d{2}\/\d{2}\/\d{4}\s\d{2}:\d{2}:\d{2}\s-\s))" | table number lastcomment
so I am doing some testing and find the problem is splunk miss reading the ")" as if I do following query
... rex field=work_notes "^\d{2}\/\d{2}\/\d{4}\s\d{2}:\d{2}:\d{2}\s-\s(?<lastcomment>.*)" | table number lastcomment
it return as
Christian (Work notes)
instead of the whole string as what ".*" expect to do
Christian (Work notes) Remote Desktop Notes: - still unable to remote in to the machine 10/08/2018 07:11:53 - Christian (Work notes) Remote Desktop Notes: - machine is offline - 08/08/2018 01:11:53 - Sam (Work notes) Remote Desktop Notes: - machine is comprimised
and if I put space between * and ) like below
...| rex field=work_notes "^\d{2}\/\d{2}\/\d{4}\s\d{2}:\d{2}:\d{2}\s-\s(?<lastcomment>.* )" | table number lastcomment
it will return as
Christian (Work
Sorry for the long post, any suggestion what is going on there?
... View more
- Tags:
- rex
- splunk-enterprise
08-07-2018
05:37 PM
tried my log it looks like working thank you for your help
... View more
08-06-2018
11:59 PM
I have data looks like below
AccountName
account1-abc$
account2-abc$
account3-xyz$
account4
I want to filter out the account name end with $ with following query
AccountName!=*$
I expect it only return account4 however it does not return anything. if I do following query
AccountName!=*adc$
it does only return me
account3-xyz$ and account4
Any suggestion why the first search does not do what expected but the second query did what expect? is that because $ is special character?
Thanks in advance
... View more
07-22-2018
07:56 PM
1 Karma
thank you for your details explaination
... View more
07-22-2018
05:22 PM
Thank you for your suggestion but it is not exactly I am looking for. I want to search any string that similar to mystring, not just two string I given.
... View more
07-21-2018
08:24 AM
Hi
Does Splunk can do similar string search?
For example the given string is mystring, and I want to return any log that contain string which looks similar as my given string such as my5tring or mystrings etc.
Cheers
... View more
06-19-2018
01:42 AM
thank you for your help
... View more
06-18-2018
06:22 PM
Hey
I want to create a field with a time value using following commend
| inputlookup task_time_worked.csv | eval deadline=-1week@week
System throw me an error
"Error in 'eval' command: The expression is malformed. "
Any suggestion of what is the right way to write this spl?
Thanks in advance
Regards
... View more
06-02-2018
12:23 PM
find the answer
need to put earilest--0month@month to give current calendar month result
... View more
06-02-2018
05:18 AM
it is dashboard
... View more
06-02-2018
05:17 AM
yea that works
Thank you for your help it is very good
... View more