• Search
  • Dashboards
  • Browse
    • Sourcetype

      • _audit
      • _internal
      • access_combined
      • apache
      • audittrail
      • citrix:netscaler:syslog
      • Cron
      • crowdstrike
      • Dashboards
      • datamodels
      • DBConnect
      • Enterprise Security
      • eval
      • F5
      • Fun Stuff & Helpful Hints
      • Hack
      • Hygiene
      • IIS
      • Juniper
      • Linux Performance
      • linux_secure
      • Malware
      • Monitoring
      • Networking
      • opensense
      • opsec
      • osx_secure
      • Perfmon:Available Memory
      • Perfmon:CPU Load
      • Perfmon:Free Disk Space
      • Perfmon:Network Interface
      • postfix_syslog
      • Qualys
      • REST
      • RFQ – Request For Query
      • splunkd
      • Tenable
      • Uncategorized
      • Unix:Uptime
      • WinEventLog:Application
      • WinEventLog:Security
      • WinEventLog:System
      • WinRegistry
      • WMI:Uptime
    • Tags

      6.1.2 admin apache audit audittrail authentication Cisco Diagnostics failed logon Firewall IIS index indexes internal license License usage Linux linux audit Login Logon malware Network Perfmon Performance qualys REST Security sourcetype splunk splunkd splunk on splunk Tenable Tenable Security Center troubleshoot troubleshooting tstats Universal Forwarder users Vulnerabilities Web Traffic Windows Windows Audit Windows Security _audit _internal
  • Post New Query
  • Our Blog
  • Splunk Jobs
  • Search
  • Dashboards
  • Browse
    • Sourcetype

      • _audit
      • _internal
      • access_combined
      • apache
      • audittrail
      • citrix:netscaler:syslog
      • Cron
      • crowdstrike
      • Dashboards
      • datamodels
      • DBConnect
      • Enterprise Security
      • eval
      • F5
      • Fun Stuff & Helpful Hints
      • Hack
      • Hygiene
      • IIS
      • Juniper
      • Linux Performance
      • linux_secure
      • Malware
      • Monitoring
      • Networking
      • opensense
      • opsec
      • osx_secure
      • Perfmon:Available Memory
      • Perfmon:CPU Load
      • Perfmon:Free Disk Space
      • Perfmon:Network Interface
      • postfix_syslog
      • Qualys
      • REST
      • RFQ – Request For Query
      • splunkd
      • Tenable
      • Uncategorized
      • Unix:Uptime
      • WinEventLog:Application
      • WinEventLog:Security
      • WinEventLog:System
      • WinRegistry
      • WMI:Uptime
    • Tags

      6.1.2 admin apache audit audittrail authentication Cisco Diagnostics failed logon Firewall IIS index indexes internal license License usage Linux linux audit Login Logon malware Network Perfmon Performance qualys REST Security sourcetype splunk splunkd splunk on splunk Tenable Tenable Security Center troubleshoot troubleshooting tstats Universal Forwarder users Vulnerabilities Web Traffic Windows Windows Audit Windows Security _audit _internal
  • Post New Query
  • Our Blog
  • Splunk Jobs

Members

Profile picture of sedi

sedi

@sedi Active 2 years ago
  • Activity
  • Profile
  • Posts
  • Personal
  • Mentions
  • Favorites
  • Profile picture of sedi
    2 years ago

    sedi wrote a new post

    check expected splunk version with realitysimply query to compare an expected splunk version with reality. simply adjust “expected_version” to your expected […]

  • Profile picture of sedi
    3 years, 2 months ago

    sedi wrote a new post

    index=_audit action=edit* info=granted operation!=list host= object=*
    | transaction action user operation host maxspan=30s
    | stats values(action) as action values(object) as modified_object by […]

  • Profile picture of sedi
    6 years, 3 months ago

    sedi wrote a new post

    Quickly identify high amounts of skipped searches in your cluster or standalone SH(s):
    index = _internal skipped sourcetype=scheduler status=skipped host=[your splunk SH(s)]
    | stats count by app search_type […]

  • Profile picture of sedi
    6 years, 3 months ago

    sedi wrote a new post

    Blocked queues are (obviously) bad for your environment so here a search to identify those:
    index=_internal sourcetype=splunkd group=queue (name=parsingQueue OR name=indexqueue OR name=tcpin_queue OR […]

  • Profile picture of sedi
    6 years, 10 months ago

    sedi wrote a new post

    The following will:

    list all knowledge objects for your SH (or given search peer(s))
    each objects name, type, app, permissions, sharing (e.g. global, app, private) and owner
    if props-extract:
    the props […]

  • Profile picture of sedi
    6 years, 10 months ago

    sedi wrote a new post

    Ok that one is a big one so be prepared ;)

    The following will (on a SH / SH Cluster):

    list all users and their roles
    list inherited roles
    list all indexes allowed by the shown roles
    list all indexes […]

    • Profile picture of SplunkNinja
      SplunkNinja replied 6 years, 10 months ago

      This is awesome!

  • Profile picture of sedi
    6 years, 10 months ago

    sedi wrote a new post

    Total count of all events for 1 or more index(es)
    Approach 1 (fastest)
    | eventcount index=foo
    or
    | eventcount index=foo index=bar
    does *not* support time ranges in the time picker
    tested on: splunk […]

  • Profile picture of sedi
    6 years, 10 months ago

    sedi became a registered member

  • Profile picture of sedi
    6 years, 10 months ago

    sedi became a registered member

  • Home
  • Log In
  • Register
  • About GoSplunk
  • GoSplunk FAQs
  • Contact the GoSplunk Team
  • Splunk Website
  • Splunk Documentation
  • Splunk Answers

GoSplunk is not affiliated with Splunk Inc. in any way.

© 2019 GoSplunk
  • Privacy Policy
  • Terms and Conditions
  • Forgot Password?
sponsored